id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/36025 | Habesh Eyalet
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Eyālet-i Ḥabeš
Eyalet of the Ottoman Empire
Flag of Habesh Eyalet
Location of Habesh Eyalet
The Eyalet of Jeddah-Habesh in 1795
Capital Massawa,[1] Sawakin,[2] Jeddah[2]
- Established 1554
- Disestablished 1872
- 1856[3] 503,000 km2 (194,209 sq mi)
Today part of Sudan
Saudi Arabia
Habesh Eyalet (Ottoman Turkish: ایالت حبش; Eyālet-i Ḥabeš),[4] was an Ottoman eyalet. It was also known as the Eyalet of Jeddah and Habesh, as Jeddah was its chief town,[5] and Habesh and Hejaz.[6] It extended on the areas of coastal Hejaz and Africa that border on the Red Sea basin.[5] On the African side, it comprised Massawa, Hirgigo, Suakin and their hinterlands.
In 1517, the Ottoman Turks conquered the Mamluk Sultanate in Egypt and Syria, during the reign of Selim I.[8] As such, territories of the Sultanate including Jeddah and Mecca were controlled by the Ottomans. Jeddah was then expanded for the purpose of protecting the borders of the Ottoman Empire from Portuguese invasions.
The Ottoman Empire then began extending its borders throughout the rest of the Red Sea coast. Muslim rulers from Sudan and the Arabian Peninsula were dominant in the African Red Sea coast until the Ottoman Turks arrived in the 16th century.[9] The ports of Suakin and Massawa were occupied by Özdemir Pasha, who had been appointed beylerbey in 1555, and the province of Habesh was formed in 1557. Massawa being of secondary economical importance, the administrative capital was soon moved across the Red Sea to Jeddah (from the end of the 16th century until the early 19th century; Medina temporarily served as the capital in the 18th century).[10]
The Ottoman Turks made multiple advances further inland conquering Medri Bahri.[11] A sanjak of Ibrim was established in the 1560s.[12] In 1571, the governor of Habesh moved to break a siege of Suakin by forces of the Funj kingdom.[12] The expansion was halted in 1578, and the Ottomans retired from most of the highlands. During the following centuries, the Ottoman administration largely refrained from further interventions, relying on a system of indirect rule. Only on the island of Massawa itself was there an Ottoman governor, who controlled trade and taxes; in Sawakin the Ottoman authorities appointed a customs officer. The garrison of Hirgigo, made up of Kurds, Albanians, Turks and Arabs, mixed with the local population, their descendants keeping the Ottoman rents and titles.[10]
There is very little in the way of source material for Ottoman rule in the eyalet of Habesh after the 16th century. Most of Cengiz Orhonlu's Ottoman sources on Habesh come from the late 16th century, with some from the 17th century. Despite the seminal nature of his Habesh Eyaleti, he could not "find precise data regarding the administrative and financial structure of the province" or information on any agricultural taxation.[13]
Move of the seat to Jeddah[edit]
When the Ottomans became dominant in the Hejaz in 1517, Jeddah had been established as a sanjak under the authority of Beylerbeyilik of Egypt.[14] As Jeddah developed into an important centre of trade, the Ottomans turned Jeddah into a beylerbeyilik itself.[15] In the 18th century it was attached to the eyalet of Habeş, and governors of the rank of vizier started to be appointed here.[15]
In 1701 Suakin and the other Ottoman possessions on the African coast were put under the authority of the governor in Jeddah.[16] After its combination with Jeddah, the eyalet gained importance.[15] Owing to the great distance from the capital, the Ottomans had little control over the Pasha of Jeddah, and their authority over the region was mostly nominal.[17]
In 1829, John Lewis Burckhardt described the pashalik of Jeddah as having been "reduced to perfect insignificance" by the power of the Sharif of Mecca, and the title was bestowed upon individuals who had never attempted to take possession of their governorship.[18]
Even before the takeover by Wahhabi rebels of most of Hejaz in 1803, the appointment to the governorship of Jeddah was said to be little esteemed, and considered tantamount to exile.[18] Burckhardt also noted that the Pasha styled himself wali (or governor) of not only Jeddah, but also Sawakin and Habesh, and he kept custom-house officers at Sawakin and Massawa.[18]
When Muhammad Ali successfully fought the Ottoman–Saudi War, he received the administration of Habesh in 1813. His son Ahmad Tushun Pasha was appointed wali by a firman, thus also gaining control over the ports of Sawakin and Massawa. Muhammad Ali's control of Habesh was only temporary; after the Wahhabi emergence came to an end, it reverted to Ottoman rule in 1827. Massawa and Sawakin were given to him again in 1846, until his death in 1849.[10]
In 1866, however, Habesh was taken away from Jeddah and formally incorporated into the Egyptian vice-kingdom as a separate entity. Thus Habesh ceased to exist in its traditional form and starting from 1869 was replaced by a series of subsequent Egyptian governorates.[10] In 1871, after the removal from office of wali Hurşid Pasha, the position of the Jeddah wali was briefly abolished and the mutasarrıflık of Jeddah was installed in its place. This reorganization lasted only one year, and the walilik was brought back the following year.[19] The Eyalet of Jeddah was then transformed into the Hejaz Vilayet, with a governor in Mecca.[19]
Administrative divisions[edit]
Sanjaks of the Eyalet:[10]
1. Sanjak of Ibrim
2. Sanjak of Sawakin
3. Sanjak of Hargigo
4. Sanjak of Massawa
5. Sanjak of Zayla
6. Sanjak of Jeddah
Sanjaks in the 1860s:[20]
1. Sanjak of Yemen (until c. 1849, then became the Eyalet of Yemen)
2. Sanjak of Najd
3. Sanjak of Mecca
4. Sanjak of Jeddah
5. Sanjak of Medina
Specific Ottoman interest in Habeshistan arose from its pivotal geographic position in the region: it had ports and coastline on both the Red Sea (and near the Bab-el-Mandeb, where Ottoman blockades could be performed if necessary) and on the Indian Ocean (specifically Zeila and the Somali coast). The Ottoman navy was still relatively weak and in its infancy, so Ottoman land forces would have to capture key areas to ensure that the weak navy would have some influence and strengthen.[21] Selman also recognized a religious duty to conquer Habesh.[22]
After the 1517 conquests, the Ottomans also were interested in the region because of the hajj. Having conquered the former Muslim defenders of the hajj, the Ottomans, being the successor of those states, was charged with protecting and providing safe passage to all undertaking the hajj.[23] Portuguese hegemony in the Red Sea and Indian Ocean, however, gave them some control over hajjis. In the same vein, other Muslim states in the region saw the Ottomans as their defenders as Muslim brothers:
The Shah of Hormuz, Sharafaldin, wrote a letter to Sultan Süleyman to provide him with military help in order to expel the Portuguese from Hormuz. The ruler of Gujerat [Gujarat] also sought Ottoman military help.[23]
Finally, there was a pre-emptive element to the Ottoman invasion of Ethiopia. If the Portuguese had built fortresses and taken control of the Red Sea ports first (especially Dahlak), they would have controlled the whole region, both directly and through their allies.[22] Despite the possible economic gain from taxing Habesh proper, the Ottomans were more concerned with overcoming and outmaneuvering the Portuguese in the Red Sea and Indian Ocean.
Part of the reasoning behind Ottoman expansion was to aid fellow Muslim states in the new role it had taken on, but economic issues were pertinent as well. Though weapons were usually given unilaterally, the Muslim states could provide another source of revenue through the selling of firearms, as those were greatly in demand there. More important, however, was the Red Sea trade, despite its relatively small revenue.[23] The Ottomans even constructed a canal some time after 1532 between the Nile and the Red Sea so that spices could go directly to Constantinople.[24]
According to Dom Andre de Oviedo, the Ottomans were interested in the area because of the prospect of capturing slaves for galleys, provisions, iron, and other goods.[25] According to Selman Reis, an ambitious Ottoman Red Sea admiral, the coast (specifically the Dahlak Archipelago) was also rich with pearls, and the amount of merchandise and trade consisting of "gold, musk, and ivory" present at Berbera, on the Somali coast, was described by Selman as "limitless".[26]
Despite the promises of Selman Reis, Habesh did not provide much revenue for the Ottomans, partly because the spice trade was not very profitable, but more importantly because the rich hinterlands were unconquered, with the Ottomans holding only the dry and hot coasts. Given that Yemen often cost more in upkeep than it sent to Constantinople as taxes, and that Habesh had much less in the way of agricultural taxes (but just as high a salary for the beylerbeyi), the province was probably very unprofitable.[27]
Habesh, along with other 16th century conquests, was not under the timar system as were lands conquered in Europe and Anatolia. Rather, it was a salyaneli province, in which taxes "were collected directly for the centre and were transferred to the central treasury after the local expenses were deducted".[13] Due to the aridity of the province, little in the way of taxes on agriculture were collected; the most important source of revenue was the customs duty collected through iltizam (tax farming) on goods flowing through Massawa, Beylul, and Suakin in Sudan. Individuals would be allowed to collect duties, but in return would have to send a specified amount to the Sultan every year.
The slave trade represented another important source of income, based on slaves who, as mentioned earlier, were either bought from caravans visiting Massawa or acquired through cattle-raiding parties.[13] Although Ottoman interest in Habesh had dwindled by the end of the 16th century, it was still strategically located and therefore still guarded by Ottoman galleys in the 17th century.[28]
1. ^ Bethwell Allan Ogot (1992-01-01). Africa from the sixteenth to the eighteenth century. UNESCO. p. 145. ISBN 978-92-3-101711-7. Retrieved 2013-06-01.
2. ^ a b David Lea; Annamarie Rowe (2001). A political chronology of Africa.. Taylor & Francis. p. 403. ISBN 978-1-85743-116-2. Retrieved 2013-06-01.
3. ^ Thomas Baldwin (of Philadelphia.) (1856). Lippincott's Pronouncing Gazetteer: A Complete Pronouncing Gazetteer Or Geographical Dictionary of the World .... J.B. Lippincott. p. 1968. Retrieved 2013-06-01.
5. ^ a b National Archives (Great Britain) (2004). Islam: 1916-1917. Archive Editions. p. 328. ISBN 978-1-84097-070-8. Retrieved 2013-06-01. "Immediately, therefore, after the complete conquest of the lied Sea basin had been accomplished, a new province was formed —the Eyalet of Jeddah and Habecb (Abyssinia), with Jeddah for its chief town. It included the coast of Hejaz and, on the other side, that of Africa; the latter comprising the ports of Suakin, Massowah, Zeila, Berbera, Obok, Tadjuru, Ac, with the territory behind them."
6. ^ Almanach de Gotha: annuaire généalogique, diplomatique et statistique. J. Perthes. 1867. pp. 827–829. Retrieved 2013-06-01.
7. ^ Özbaran 1994, p. 194.
8. ^ "History of Arabia." Britannica.com.
9. ^ Fred M. Shelley (2013). Nation Shapes: The Story Behind the World's Borders. ABC-CLIO. p. 295. ISBN 978-1-61069-106-2. Retrieved 2013-06-10.
10. ^ a b c d e Siegbert Uhlig (2005). Encyclopaedia Aethiopica: D-Ha. Otto Harrassowitz Verlag. p. 951. ISBN 978-3-447-05238-2. Retrieved 2013-06-01.
11. ^ Okbazghi Yohannes (1991). A Pawn in World Politics: Eritrea. University of Florida Press. p. 31. ISBN 0-8130-1044-6. Retrieved 2013-07-23.
12. ^ a b Charles le Qusene (2007). Quseir: An Ottoman And Napoleonic Fortress On The Red Sea Coast Of Egypt. American Univ in Cairo Press. p. 35. ISBN 978-977-416-009-7. Retrieved 2013-06-10.
13. ^ a b c Özbaran 1994, p. 195.
14. ^ Numan 2005, p. 60.
15. ^ a b c Numan 2005, p. 61.
16. ^ Kenneth R Hall (2008). Secondary Cities and Urban Networking in the Indian Ocean Realm: C. 1400 - 1800. Lexington Books. p. 51. ISBN 978-0-7391-2835-0. Retrieved 2013-06-01.
17. ^ Sir James Porter (1854). Turkey: its history and progress. Hurst & Blackett. p. 104. Retrieved 2013-06-01.
18. ^ a b c John Lewis Burckhardt (1829). Sir W. Ouseley, ed. Travels in Arabia. pp. 87–88. Retrieved 2013-06-02.
19. ^ a b Numan 2005, p. 61-62.
20. ^ A. Viquesnel (1868). Voyage dans la Turquie d'Europe: description physique et géologique de la Thrace. Bertrand. p. 148. Retrieved 2013-06-01.
21. ^ Özbaran 1994, p. 191.
22. ^ a b Özbaran 1994, p. 108.
23. ^ a b c Özbaran 1994, p. 95.
24. ^ Özbaran 1994, p. 96.
25. ^ Özbaran 1994, p. 192.
26. ^ Özbaran 1994, pp. 108-109.
27. ^ Özbaran 1994, p. 35.
28. ^ Özbaran 1994, p. 196.
• Özbaran, Salih (1994), The Ottoman Response to European Expansion: Studies on Ottoman-Portuguese Relations in the Indian Ocean and Ottoman Administration in the Arab Lands During the Sixteenth Century, Isis Press
• Numan, Nurtaç (November 2005), The Emirs of Mecca and the Ottoman Government of Hijaz, 1840-1908, The Institute for Graduate Studies in Social Sciences |
global_01_local_0_shard_00000017_processed.jsonl/36027 | GHC: Ticket #784: defining type of returned value en-us GHC Trac 1.0.1 guest Sun, 04 Jun 2006 16:06:18 GMT attachment set <ul> <li><strong>attachment</strong> set to <em>ForeignPtr.hs</em> </li> </ul> Ticket guest Sun, 04 Jun 2006 16:07:19 GMT <p> ghc panics when compiling enclosed file: </p> <p> ghc.EXE: panic! (the `impossible' happened, GHC version 6.4.2): </p> <blockquote> <p> nameModule a{tv a185} </p> </blockquote> <p> Please report this as a compiler bug. See: </p> <blockquote> <p> <a href=""></a> </p> </blockquote> Ticket simonpj Mon, 05 Jun 2006 11:17:56 GMT priority changed <ul> <li><strong>priority</strong> changed from <em>normal</em> to <em>low</em> </li> </ul> <p> I know what is going on here. The key code is: </p> <pre class="wiki">foo :: IO (ForeignPtr a) = undefined baz :: IO (ForeignPtr a) baz = undefined </pre><p> Here, the binding of <tt>foo</tt> is supposed to bind <tt>a</tt>, while the type sig on <tt>baz</tt> uses <tt>a</tt>. Unfortunately, the dependency analyser isn't taking scoped type variables into account, which is clearly a bug. </p> <p> The exact setup for scoped type variables is under review, so I'm reluctant to invest effort in fixing this (it's not entirely trivial). So for now I'm going to leave it as an open bug with low priority. </p> <p> Workaround: don't use a pattern binding that binds a scoped type variable. My bet s that you didn't intend that in the first place. </p> <p> Simon </p> Ticket igloo Thu, 25 Jan 2007 13:54:41 GMT milestone set <ul> <li><strong>milestone</strong> set to <em>_|_</em> </li> </ul> Ticket simonmar Fri, 25 Jan 2008 10:29:18 GMT status changed; resolution set <ul> <li><strong>status</strong> changed from <em>new</em> to <em>closed</em> </li> <li><strong>resolution</strong> set to <em>fixed</em> </li> </ul> <p> This module now reports an error in 6.8.2: </p> <pre class="wiki">784.hs:4:35: Not in scope: type variable `a' </pre><p> So it appears to be fixed. </p> Ticket simonmar Tue, 30 Sep 2008 15:40:46 GMT architecture changed <ul> <li><strong>architecture</strong> changed from <em>Unknown</em> to <em>Unknown/Multiple</em> </li> </ul> Ticket simonmar Tue, 30 Sep 2008 15:52:05 GMT os changed <ul> <li><strong>os</strong> changed from <em>Unknown</em> to <em>Unknown/Multiple</em> </li> </ul> Ticket |
global_01_local_0_shard_00000017_processed.jsonl/36028 | Skip to content
This repository
Subversion checkout URL
You can clone with HTTPS or Subversion.
Download ZIP
1. Contributors
Contributions over time
Show Contributors →
2. Commit Activity
Commit activity over the previous year
Show Commits →
3. Code Frequency
Additions and deletions over time
Show Code Frequency →
4. Punchcard
Time and day of commit activity
Show Punchcard →
Something went wrong with that request. Please try again. |
global_01_local_0_shard_00000017_processed.jsonl/36030 | Skip to content
This repository
Django social authentication made simple
Django Social Auth
Django Social Auth is an easy to setup social authentication/authorization mechanism for Django projects.
Crafted using base code from django-twitter-oauth and django-openid-auth, implements a common interface to define new authentication providers from third parties.
You can check this documentation on Read the Docs too.
There's a demo at Note: It lacks some backends support at the moment.
This application provides user registration and login using social sites credentials, some features are:
Dependencies that must be meet to use the application:
From pypi:
$ pip install django-social-auth
$ easy_install django-social-auth
or clone from github:
$ git clone git://
and add social_auth to PYTHONPATH:
$ export PYTHONPATH=$PYTHONPATH:$(pwd)/django-social-auth/
$ cd django-social-auth
$ sudo python install
• Add social_auth to PYTHONPATH and installed applications:
• Add desired authentication backends to Django's AUTHENTICATION_BACKENDS setting:
Take into account that backends must be defined in AUTHENTICATION_BACKENDS or Django won't pick them when trying to authenticate the user.
Don't miss django.contrib.auth.backends.ModelBackend if using django.auth user model or users won't be able to login.
• Setup needed OAuth keys (see OAuth section for details):
TWITTER_CONSUMER_KEY = ''
FACEBOOK_APP_ID = ''
FACEBOOK_API_SECRET = ''
ORKUT_CONSUMER_KEY = ''
GOOGLE_CONSUMER_KEY = ''
GITHUB_APP_ID = ''
GITHUB_API_SECRET = ''
DROPBOX_APP_ID = ''
DROPBOX_API_SECRET = ''
FLICKR_APP_ID = ''
FLICKR_API_SECRET = ''
INSTAGRAM_CLIENT_ID = ''
VK_APP_ID = ''
VK_API_SECRET = ''
• Setup login URLs:
LOGIN_URL = '/login-form/'
LOGIN_REDIRECT_URL = '/logged-in/'
LOGIN_ERROR_URL = '/login-error/'
Check Django documentation at Login URL and Login redirect URL
If a custom redirect URL is needed that must be different to LOGIN_URL, define the setting:
SOCIAL_AUTH_LOGIN_REDIRECT_URL = '/another-login-url/'
A different URL could be defined for newly registered users:
SOCIAL_AUTH_NEW_USER_REDIRECT_URL = '/new-users-redirect-url/'
or for newly associated accounts:
SOCIAL_AUTH_NEW_ASSOCIATION_REDIRECT_URL = '/new-association-redirect-url/'
or for account disconnections:
SOCIAL_AUTH_DISCONNECT_REDIRECT_URL = '/account-disconnected-redirect-url/'
Users will be redirected to LOGIN_ERROR_URL in case of error or user cancellation on some backends. This URL can be override by this setting:
SOCIAL_AUTH_BACKEND_ERROR_URL = '/new-error-url/'
• Configure authentication and association complete URL names to avoid possible clashes:
SOCIAL_AUTH_COMPLETE_URL_NAME = 'socialauth_complete'
SOCIAL_AUTH_ASSOCIATE_URL_NAME = 'socialauth_associate_complete'
• Add URLs entries:
urlpatterns = patterns('',
All django-social-auth URLs names have socialauth_ prefix.
• Define context processors if needed:
• social_auth_by_name_backends: Adds a social_auth dict where each key is a provider name and its value is a UserSocialAuth instance if user has associated an account with that provider, otherwise None.
• social_auth_backends: Adds a social_auth dict with keys are associated, not_associated and backends. associated key is a list of UserSocialAuth instances associated with current user. not_associated is a list of providers names that the current user doesn't have any association yet. backends holds the list of backend names supported.
• social_auth_by_type_backends: Simiar to social_auth_backends but each value is grouped by backend type openid, oauth2 and oauth.
Check social_auth.context_processors for details.
Note: social_auth_backends and social_auth_by_type_backends don't play nice together.
• Sync database to create needed models:
./ syncdb
• Not mandatory, but recommended:
SOCIAL_AUTH_DEFAULT_USERNAME = 'new_social_auth_user'
import random
SOCIAL_AUTH_DEFAULT_USERNAME = lambda: random.choice(['Darth Vader', 'Obi-Wan Kenobi', 'R2-D2', 'C-3PO', 'Yoda'])
in case your user layout needs to purify username on some weird way.
Final user name will have a random UUID-generated suffix in case it's already taken. The UUID token max length can be changed with the setting:
• Backends will store extra values from response by default, set this to False to avoid such behavior:
Also more extra values will be stored if defined, details about this setting are listed below on OpenId and OAuth sections.
Session expiration time is an special value, it's recommended to define:
and use such setting name where expiration times are returned. View that completes login process will set session expiration time using this name if it's present or expires by default. Expiration configuration can be disabled with setting:
• It's possible to override the used User model if needed:
SOCIAL_AUTH_USER_MODEL = 'myapp.CustomUser'
This class must have a custom Model Manager with a create_user method that resembles the one on auth.UserManager.
Also, it's highly recommended that this class define the following fields:
username = CharField(...)
last_login = DateTimeField(blank=True)
is_active = BooleanField(...)
and the method:
These are needed to ensure a better django-auth integration, in other case login_required won't be usable. A warning is displayed if any of these are missing. By default auth.User is used.
Check example application for implementation details, but first, please take a look to User Profiles, it might be what you were looking for.
It's possible to disable user creations by django-social-auth with:
It is also possible to associate multiple user accounts with a single email address, set value as True to enable, otherwise set as False to disable. This behavior is enabled by default (True) unless specifically set:
• You can send extra parameters on auth process by defining settings per provider, example to request Facebook to show Mobile authorization page, define:
FACEBOOK_AUTH_EXTRA_ARGUMENTS = {'display': 'touch'}
For other providers, just define settings in the form:
<uppercase backend name>_AUTH_EXTRA_ARGUMENTS = {...}
• Also, you can send extra parameters on request token process by defining settings per provider in the same way explained above but with this other suffix:
<uppercase backend name>_REQUEST_TOKEN_EXTRA_ARGUMENTS = {...}
• By default the application doesn't make redirects to different domains, to disable this behavior:
• Inactive users can be redirected to a different page if this setting is defined:
Defaults to LOGIN_ERROR_URL.
• The application catches any exception and logs errors to logger or django.contrib.messagess application by default. But it's possible to override the default behavior by defining a function to process the exceptions using this setting:
SOCIAL_AUTH_PROCESS_EXCEPTIONS = 'social_auth.utils.process_exceptions'
The function parameters will request holding the current request object, backend with the current backend and err which is the exception instance.
Recently this set of exceptions were introduce to describe the situations a bit more than the old ValueError usually raised:
AuthException - Base exception class
AuthFailed - Authentication failed for some reason
AuthCanceled - Authentication was canceled by the user
AuthUnknownError - An unknown error stoped the authentication
AuthTokenError - Unauthorized or access token error, it was
invalid, impossible to authenticate or user
removed permissions to it.
AuthMissingParameter - A needed parameter to continue the process was
missing, usually raised by the services that
need some POST data like myOpenID
These are a subclass of ValueError to keep backward compatibility.
Having tracebacks is really useful when debugging, for that purpose this setting was defined:
It's default value is DEBUG, so you need to set it to False to avoid tracebacks when DEBUG = True.
• When your project is behind a reverse proxy that uses HTTPS the redirect URIs can became with the wrong schema (http:// instead of https://), and might cause errors with the auth process, to force HTTPS in the final URIs define this setting:
Some settings can be tweak by backend by adding the backend name prefix (all uppercase and replace - with _), here's the supported settings so far:
Authentication Pipeline
The final process of the authentication workflow is handled by a operations pipeline where custom functions can be added or default items can be removed to provide a custom behavior.
The default pipeline is composed by:
But it's possible to override it by defining the setting SOCIAL_AUTH_PIPELINE, for example a pipeline that won't create users, just accept already registered ones would look like this:
Each pipeline function will receive the following parameters:
• Current social authentication backend
• User ID given by authentication provider
• User details given by authentication provider
• is_new flag (initialized in False)
• current logged in user (if it's logged in, otherwise None)
• current request
Each pipeline entry must return a dict or None, any value in the dict will be used in the kwargs argument for the next pipeline entry.
The workflow will be cut if the exception social_auth.backends.exceptions.StopPipeline is raised at any point.
If any function returns something else beside a dict or None, the workflow will be cut and the value returned immediately, this is useful to return HttpReponse instances like HttpResponseRedirect.
Partial Pipeline
It's possible to cut the pipeline process to return to the user asking for more data and resume the process later, to accomplish this add the entry social_auth.backends.pipeline.misc.save_status_to_session (or a similar implementation) to the pipeline setting before any entry that returns an HttpResponse instance:
When it's time to resume the process just redirect the user to /complete/<backend>/ view. By default the pipeline will be resumed in the next entry after save_status_to_session but this can be modified by setting the following setting to the import path of the pipeline entry to resume processing:
SOCIAL_AUTH_PIPELINE_RESUME_ENTRY = 'social_auth.backends.pipeline.misc.save_status_to_session'
save_status_to_session saves needed data into user session, the key can be defined by SOCIAL_AUTH_PARTIAL_PIPELINE_KEY which default value is partial_pipeline:
Check the example application to check a basic usage.
Deprecated bits
The following settings are deprecated in favor of pipeline functions.
• These settings should be avoided and override get_username pipeline entry with the desired behavior:
• User creation setting should be avoided and remove the entry create_user from pipeline instead:
• Automatic data update should be stopped by overriding update_user_details pipeline entry instead of using this setting:
• Extra data retrieval from providers should be stopped by removing load_extra_data from pipeline instead of using this setting:
• Automatic email association should be avoided by removing associate_by_email pipeline entry instead of using this setting:
• Associate URLs are deprecated since the login ones can handle the case, this avoids issues where providers check the redirect URI and redirects to the configured value in the application. So, from now on a single entry point is recommended being:
/<social auth path>/login/<backend>/
And to complete the process:
/<social auth path>/complete/<backend>/
Usage example
Authentication process starts with socialauth_begin URL.
Template code example:
<a href="{% url socialauth_begin 'twitter' %}">Enter using Twitter</a>
<a href="{% url socialauth_begin 'facebook' %}">Enter using Facebook</a>
In the example above we assume that Twitter and Facebook authentication backends enabled, and following settings provided:
TWITTER_CONSUMER_KEY = 'real key here'
TWITTER_CONSUMER_SECRET = 'real secret here'
FACEBOOK_APP_ID = 'real id here'
FACEBOOK_API_SECRET = 'real secret here'
A pre_update signal is sent when user data is about to be updated with new values from authorization service provider, this apply to new users and already existent ones. This is useful to update custom user fields or User Profiles, for example, to store user gender, location, etc. Example:
from social_auth.signals import pre_update
from social_auth.backends.facebook import FacebookBackend
def facebook_extra_values(sender, user, response, details, **kwargs):
user.gender = response.get('gender')
return True
pre_update.connect(facebook_extra_values, sender=FacebookBackend)
New data updating is made automatically but could be disabled and left only to signal handler if this setting value is set to True:
Take into account that when defining a custom User model and declaring signal handler in, the imports and handler definition must be made after the custom User model is defined or circular imports issues will be raised.
Also a new-user signal (socialauth_registered) is sent when new accounts are created:
from social_auth.signals import socialauth_registered
def new_users_handler(sender, user, response, details, **kwargs):
user.is_new = True
return False
socialauth_registered.connect(new_users_handler, sender=None)
Almost every service covered provide some kind of API that is protected with access_token or token pairs (like Twitter OAuth keys). These tokens are gathered by the authentication mechanism and stored in UserSocialAuth.extra_data.
UserSocialAuth has a property named tokens to easilly access this useful values, it will return a dictionary containing the tokens values. A simple usage example:
>>> from pprint import pprint
>>> from social_auth.models import UserSocialAuth
>>> instance = UserSocialAuth.objects.filter(provider='twitter').get(...)
>>> pprint(instance.tokens)
{u'oauth_token': u'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx',
u'oauth_token_secret': u'yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy'}
>>> instance = UserSocialAuth.objects.filter(provider='facebook').get(...)
>>> pprint(instance.tokens)
{u'access_token': u'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'}
OpenId support is simpler to implement than OAuth. Google and Yahoo providers are supported by default, others are supported by POST method providing endpoint URL.
OpenId backends can store extra data in UserSocialAuth.extra_data field by defining a set of values names to retrieve from any of the used schemas, AttributeExchange and SimpleRegistration. As their keywords differ we need two settings.
Settings is per backend, so we have two possible values for each one. Name is dynamically checked using uppercase backend name as prefix:
<uppercase backend name>_SREG_EXTRA_DATA
<uppercase backend name>_AX_EXTRA_DATA
GOOGLE_AX_EXTRA_DATA = [(..., ...)]
Settings must be a list of tuples mapping value name in response and value alias used to store. A third value (boolean) is supported to, it's purpose is to signal if the value should be discarded if it evaluates to False, this is to avoid replacing old (needed) values when they don't form part of current response. If not present, then this check is avoided and the value will replace any data.
OAuth communication demands a set of keys exchange to validate the client authenticity prior to user approbation. Twitter, Facebook and Orkut facilitates these keys by application registration, Google works the same, but provides the option for unregistered applications.
Check next sections for details.
OAuth backends also can store extra data in UserSocialAuth.extra_data field by defining a set of values names to retrieve from service response.
Settings is per backend and it's name is dynamically checked using uppercase backend name as prefix:
<uppercase backend name>_EXTRA_DATA
FACEBOOK_EXTRA_DATA = [(..., ...)]
Twitter offers per application keys named Consumer Key and Consumer Secret. To enable Twitter these two keys are needed. Further documentation at Twitter development resources:
• Register a new application at Twitter App Creation,
• mark the "Yes, use Twitter for login" checkbox, and
• fill Consumer Key and Consumer Secret values:
• You need to specify an URL callback or the application will be marked as Client type instead of the Browser. Almost any dummy value will work if you plan some test.
Facebook works similar to Twitter but it's simpler to setup and redirect URL is passed as a parameter when issuing an authorization. Further documentation at Facebook development resources:
• Register a new application at Facebook App Creation, and
• fill App Id and App Secret values in values:
• Define FACEBOOK_EXTENDED_PERMISSIONS to get extra permissions from facebook. NOTE: to get users' email addresses, you must request the 'email' permission:
Take into account that Facebook doesn't return user email by default, this setting is needed if email is required:
• Define FACEBOOK_PROFILE_EXTRA_PARAMS to pass extra parameters to when gathering the user profile data, like:
If you define a redirect URL in Facebook setup page, be sure to not define or http://localhost:8000 because it won't work when testing. Instead I define and setup a mapping on /etc/hosts or use dnsmasq.
Orkut offers per application keys named Consumer Key and Consumer Secret. To enable Orkut these two keys are needed.
Check Google support and Orkut API for details on getting your consumer_key and consumer_secret keys.
• fill Consumer Key and Consumer Secret values:
• add any needed extra data to:
• configure extra scopes in:
Google OAuth
Google provides Consumer Key and Consumer Secret keys to registered applications, but also allows unregistered application to use their authorization system with, but beware that this method will display a security banner to the user telling that the application is not trusted.
Check Google OAuth and make your choice.
• fill Consumer Key and Consumer Secret values:
anonymous values will be used if not configured as described in their OAuth reference
• configure the display name to be used in the "grant permissions" dialog that Google will display to users in:
shows 'Social Auth' by default, but that might not suite your application.
• setup any needed extra scope in:
Check which applications can be included in their Google Data Protocol Directory
Google OAuth2
Recently Google launched OAuth2 support following the definition at OAuth2 draft. It works in a similar way to plain OAuth mechanism, but developers must register an application and apply for a set of keys. Check Google OAuth2 document for details.
This support is experimental as Google implementation may change and OAuth2 is still a draft.
To enable OAuth2 support:
• fill Client ID and Client Secret settings, these values can be obtained easily as described on OAuth2 Registering doc:
previous name GOOGLE_OAUTH2_CLIENT_KEY is supported for backward compatibility.
• scopes are shared between OAuth mechanisms:
Check which applications can be included in their Google Data Protocol Directory
LinkedIn setup is similar to any other OAuth service. To request extra fields using LinkedIn fields selectors just define the setting:
with the needed fields selectors, also define LINKEDIN_EXTRA_DATA properly, that way the values will be stored in UserSocialAuth.extra_data field.
By default id, first-name and last-name are requested and stored.
GitHub works similar to Facebook (OAuth).
• Register a new application at GitHub Developers, set your site domain as the callback URL or it might cause some troubles when associating accounts,
• Fill App Id and App Secret values in the settings:
GITHUB_APP_ID = ''
• Also it's possible to define extra permissions with:
Bitbucket works similar to Twitter (OAuth).
• Register a new application by emailing with an application name and a bit of a description,
• Fill Consumer Key and Consumer Secret values in the settings:
Dropbox uses OAuth v1.0 for authentication.
• Register a new application at Dropbox Developers, and
• fill App Key and App Secret values in the settings:
Flickr uses OAuth v1.0 for authentication.
• Register a new application at the Flickr App Garden, and
• fill Key and Secret values in the settings:
FLICKR_APP_ID = ''
Support for BrowserID is possible by posting the assertion code to /complete/browserid/ URL.
The setup doesn't need any setting, just the usual BrowserID javascript include in your document and the needed mechanism to trigger the POST to django-social-auth.
Check the second "Use Case" for an implementation example.
Instagram uses OAuth v2 for Authentication
• Register a new application at the Instagram API, and
• fill Client Id and Client Secret values in the settings:
Instagram only allows one callback url so you'll have to change your to accomodate both /complete and /associate routes, for example by having a single /associate url which takes a ?complete=true parameter for the cases when you want to complete rather than associate.
Vkontakte uses OAuth v2 for Authentication
• Register a new application at the Vkontakte API, and
• fill App Id and Api Secret values in the settings:
VK_APP_ID = ''
VK_API_SECRET = ''
• Also it's possible to define extra permissions with:
VK_EXTRA_SCOPE = [...]
See the names of the privileges VKontakte.
To test the application just run:
./ test social_auth
This will run a bunch of tests, so far only login process is tested, more will come eventually.
User accounts on the different sites are needed to run tests, configure the credentials in the following way:
# twitter testing
TEST_TWITTER_USER = 'testing_account'
TEST_TWITTER_PASSWORD = 'password_for_testing_account'
# facebook testing
TEST_FACEBOOK_USER = 'testing_account'
TEST_FACEBOOK_PASSWORD = 'password_for_testing_account'
# google testing
TEST_GOOGLE_PASSWORD = 'password_for_testing_account'
There's support for Selenium tests too on root contrib directory. To run install selenium:
$ pip install selenium
and create a copying and fill the needed account information. Then run:
cd contrib/tests
Use Cases
Some particular use cases are listed below.
1. Use social auth just for account association (no login):
urlpatterns += patterns('',
url(r'^associate/(?P<backend>[^/]+)/$', associate,
url(r'^associate/complete/(?P<backend>[^/]+)/$', associate_complete,
url(r'^disconnect/(?P<backend>[^/]+)/$', disconnect,
disconnect, name='socialauth_disconnect_individual'),
2. Include a similar snippet in your page to make BrowserID work:
<!-- Include BrowserID JavaScript -->
<!-- Define a form to send the POST data -->
<form method="post" action="{% url socialauth_complete "browserid" %}">
<input type="hidden" name="assertion" value="" />
<a rel="nofollow" id="browserid" href="#">BrowserID</a>
<!-- Setup click handler that retieves BrowserID assertion code and sends
POST data -->
<script type="text/javascript">
$(function () {
$('#browserid').click(function (e) {
var self = $(this);
(assertion) {
if (assertion) {
.attr('value', assertion)
} else {
alert('Some error occurred');
Mailing list
Join to django-social-auth discussion list and bring any questions or suggestions that would improve this application. Convore discussion group is deprecated since the service is going to be shut down on April 1st.
South users
South users should add this rule to enable migrations:
import south
from south.modelsinspector import add_introspection_rules
add_introspection_rules([], ["^social_auth\.fields\.JSONField"])
Custom User model
If defining a custom user model, do not import social_auth from any that would finally import from the that defines your User class or it will make your project fail with a recursive import because social_auth uses get_model() to retrieve your User.
Third party backends
There's an ongoing movement to create a list of third party backends on, so, if somebody doesn't want it's backend in the contrib directory but still wants to share, just split it in a separated package and link it there.
Python 2.7.2rev4, 2.7.3 and Facebook backend
Seems that this bug described in StackOverflow hits users using django-social-auth with Python versions 2.7.2rev4 and 2.7.3 (so far) and Facebook backend. The bug report #315 explains it a bit more and shows a workaround fit avoid it.
Maybe several, please create issues in github
Attributions to whom deserves:
• caioariede (Caio Ariede):
• Improvements and Orkut support
• krvss (Stas Kravets):
• Initial configuration
• jezdez (Jannis Leidel):
• Improvements and documentation update
• alfredo (Alfredo Ramirez)
• Facebook and Doc improvements
• mattucf (Matt Brown)
• Twitter and OAuth improvements
• Quard (Vadym Zakovinko)
• LinkedIn support
• micrypt (Seyi Ogunyemi)
• OAuth2 migration
• bedspax
• Foursquare support
• revolunet (Julien Bouquillon)
• GitHub support
• danielgtaylor (Daniel G. Taylor)
• Dropbox support
• Flickr support
• Provider name context processor
• r4vi (Ravi Kotecha)
• Instagram support
Base work is copyrighted by:
• django-twitter-oauth:
Original Copyright goes to Henrik Lied (henriklied)
Code borrowed from
• django-openid-auth:
django-openid-auth - OpenID integration for django.contrib.auth
Copyright (C) 2007 Simon Willison
Copyright (C) 2008-2010 Canonical Ltd.
Something went wrong with that request. Please try again. |
global_01_local_0_shard_00000017_processed.jsonl/36052 |
Bug#274609: does not seem to have an effect
martin f krafft wrote:
> I tried it also on a normal system (the above is a VMware install,
> should not make a difference), and in a pbuilder chroot. The problem
> does *not* exist in the chroot (even though DEBIAN_* was unset).
Ok this is due to a bug in base-config making it load the priority if
the system was installed with d-i. Will fix.
see shy jo
Attachment: signature.asc
Description: Digital signature
Reply to: |
global_01_local_0_shard_00000017_processed.jsonl/36053 |
Re: (Vcs-Upstream-)Git support for uscan?
On 04/19/2011 09:03 AM, Timo Juhani Lindfors wrote:
> Evgeni Golov <[email protected]> writes:
>> We (lindi, liw and me) had just a short discussion in #-devel, that it
>> would be nice to have some sort of Vcs-Upstream-* in debian/control
> How many packages are there that are not using a watch file because
> upstream does not provide usable tarballs (either no tarballs or they
> are behind some changing dynamic web site layout)?
> Would it be a completely silly idea to extend uscan to support git in
> addition to HTTP and FTP that it currently supports?
And SVN, bzr, hg, CVS, Darcs, did I miss someone? :)
This is imho the task of the get-orig-source rule in debian/rules (which
needs a generic helper so not everyone has to invent the wheel again,
but thats a different topic).
Reply to: |
global_01_local_0_shard_00000017_processed.jsonl/36054 |
Re: Ubuntu & casper
On 08/08/2012 02:46 PM, Luigi Capriotti wrote:
you may want to check our repo where you can find a working example of
an ubuntu-derived distro built using live-build:
speaking of which.. do you have any patches left for us?
Reply to: |
global_01_local_0_shard_00000017_processed.jsonl/36055 |
Re: Criteria for a successful DPL board
On Wed, 14 Feb 2007, Manoj Srivastava wrote:
> How is the current DPL board proposal different from the
> project SCUD that was tried out a couple of DPL's ago? From what I
> recall, project SCUD started out with a bang, but did not end up
> making much of an impression on me. Given that this has been tried
> before, and mostly did not work in the glowing manner in which it was
> painted before and as you are painting the DPL board, what makes you
> think a project SCUD raised from the dead is likely to wrk any better
> this time than it did the last time?
I'm sure people from the SCUD team can complete (or correct me).
No real delegation was made to the scud team. In other words, Branden had
all the powers, he had a team to help him but unfortunately due to
personal circumstances he didn't manage to make much use of that help.
AFAIK stockholm tried to fill the vacuum but without much success given
that there were simply no way for the team to effectively replace Branden
while it was MIA. Furthermore, the whole team didn't agree on the way to
go forward given this unexpected disappearance of Branden, and since there
were no rules, there has been no positive outcome.
In my case, the board is delegated all the powers of the DPL including the
power to further delegate and a set of rules is defined for the board to
be able to take decisions. In other words, the board is independant of the
DPL. It is my plan to not use the DPL power for anything else than
organizing the board. It means I would deal with my projects like any
other board member: by submitting them to the board, gaining approval and
eventually voting on them.
Raphaël Hertzog
Premier livre français sur Debian GNU/Linux :
Reply to: |
global_01_local_0_shard_00000017_processed.jsonl/36057 | Numlock as standard?
Marcus Zingmark blackline at
Mon Aug 15 19:55:05 UTC 2005
taharka skrev:
> Marcus Zingmark wrote:
>> taharka skrev:
>>> Marcus Zingmark wrote:
>>>> How do I get Numlock to be on as standard in Fedora Core 4? Would
>>>> like it for all users if possible.
>>>> /// Marcus
>>> If using Gnome, the following works for fc3 :-)
>>> GNOME Tips
>>> Numlock
>>> Some users like to have the numlock turned on automatically,
>>> something that I don't think GNOME currently does. The solution is
>>> to install a tiny binary that turns on the numlock for you, and have
>>> GNOME run that at startup.
>>> You can install the numlock binary by downloading and installing the
>>> following rpm:
>>> numlock-0.1-0.0.yjl.1.i386.rpm
>>> If you have configured yum to use my YJL Packages repository, you
>>> can just (as root) run:
>>> yum install numlock
>>> Once numlock is installed, go to the Applications menu, select the
>>> Preferences menu, select the More Preferences menu, and finally the
>>> Sessions menu option.
>>> Select the Startup Items tab, and click on the Add button. You
>>> should get a window like this:
>>> [Add Startup Program]
>>> Enter /usr/bin/numlock into the Startup Command field. You don't
>>> really need to change the order, the default of 50 is fine. Click
>>> the OK button, and you are done. Next time you log into GNOME it
>>> will turn on the numlock for you.
>>> taharka
>>> Lexington, Kentucky U.S.A.
>> Oooh, this looks terrific. Follow up question then:
>> How do I set up a startingprogram for all users? This guide only
>> tells me how to start this program for each user...
> Have a read here; the
> following paragraph ;-)
> Because I use XDM, I just compiled
> the program, and then modified /etc/X11/xdm/Xsetup_0 to run the program,
> so numlock is on by default for everyone.
> taharka
> Lexington, Kentucky U.S.A.
Ok, just so I get this right, beacuse this is really out of my league,
after installing numlock-0.1-0.0.yjl.1.i386.rpm I should enter:
//compile using:
//gcc -I/usr/X11R6/include -L/usr/X11R6/lib -o setnumlock Numlock.c
-lX11 -lXtst
#include <X11/extensions/XTest.h>
#include <X11/keysym.h>
int main(void) {
Display* disp = XOpenDisplay( NULL );
if( disp == NULL )
return 1;
XTestFakeKeyEvent( disp, XKeysymToKeycode( disp, XK_Num_Lock), True,
CurrentTime );
XTestFakeKeyEvent( disp, XKeysymToKeycode( disp, XK_Num_Lock), False,
CurrentTime );
XCloseDisplay( disp );
return 0;
//end numlock.c
into /etc/X11/xdm/Xsetup_0 - then everyone will have Numlock activated
at startup?
The reason I'm double-checking is that I'm not sure I could fix things
back if I do wrong :p
/// Marcus
More information about the users mailing list |
global_01_local_0_shard_00000017_processed.jsonl/36063 | Flying With Python (Strong versus Weak Typing)
Peter Hansen peter at
Tue Mar 11 15:16:28 CET 2003
Hasoob ahs wrote:
> In an interview at Guido
> van Rossum was asked if "he would be comfortable enough with the
> robustness of Python systems to fly on an airplane in which ALL the
> control software was written in Python". Guido's answer was clear but
> I would like to hear from other Python programmers.
> Would you be comfortable?. Your answer may help me decide between
> strong and weak typing. I prefer an answer of yes or no followed by an
> explanation.
No simple answer can be truly valid. For example, I could start off
with "No, because Python cannot be used for hard realtime control and
aeronautical control certainly requires that."
But then again, we could ignore that part of reality and I would
say "Yes, because adequate testing (in this case of the Python
*interpreter* as well as the application code) and proper design are
sufficient, as has been noted in other responses."
But then I'd have to go and say "No, because I'm actually uncomfortable
with airplane travel (and all other environments involving software
and the safety of my own life) even as it is, with code written in
languages other than Python, because I *know* what kinds of shortcuts
get taken and what kinds of mistakes get made."
But the most direct answer, though it ignores some key parts of
reality :-), is "Yes, Python is at least as robust as certain other
languages, such as C, if not more so, *because* is has dynamic
typing and is interpreted and so high level."
More information about the Python-list mailing list |
global_01_local_0_shard_00000017_processed.jsonl/36066 | default python when multiple python installation on the box
"Martin v. Löwis" martin at
Tue Oct 24 21:35:40 CEST 2006
j_nwb schrieb:
> I have multiple python installations. 2.2, 2.3, 2.4. When I install a
> new package (pygtk2) , it always install in python 2.3.
> I changed the /usr/bin/python to be 2.4 binary. Still the same behavior.
> How does rpms, determine which installation to update ? Is there a
> file somewhere ?
> I am running in to this on Fedora as well as CenOS.
Not sure what you mean by package: RPM package or distutils package?
If RPM package: binary package or source package?
Binary RPM packages have the Python version compiled into their
extension modules, and you can't change that without recompilation.
In addition, they have the directory and file names hard-coded in
the RPM archive.
Source RPM packages have the Python version coded into their spec
file. You should read the spec file to find out what Python version
it uses.
Distutils packages use the Python version you use to run,
so you should be able to install either with "python2.4",
or get a different Python selected by changing /usr/bin/python.
Since you specifically asked about RPMs, I guess distutils packages
are of no interest to you, though.
More information about the Python-list mailing list |
global_01_local_0_shard_00000017_processed.jsonl/36069 | Skip to Content
Bill H.1213 187th (2011 - 2012)
An Act relative to regulating collection agencies
By Ms. Spiliotis of Peabody, a petition (accompanied by bill, House, No. 1213) of Joyce A. Spiliotis and others relative to the purchasing of debts by collection agencies. Financial Services.
Joyce A. Spiliotis
Petitioners: Joyce A. Spiliotis, William N. Brownsberger, Gale D. Candaras, Lori A. Ehrlich
Login To MyLegislature |
global_01_local_0_shard_00000017_processed.jsonl/36070 | Skip to Content
General Laws
Section 55. Registrars shall, from the names entered in the annual register and from the names maintained on the inactive voters list, prepare voting lists for use at elections; provided, however, that such registrars shall not enter the names of women voters in separate columns or lists. In such voting lists, such registrars shall place the names of all voters entered on the annual register and those maintained on the inactive voters list and opposite to the name of each his residence and party enrollment. The registrars shall maintain separate voting lists for active and inactive voters or one voting list if inactive voters are designated as such on the voting list. In cities they shall prepare such voting lists by wards, and if a ward or town is divided into voting precincts, they shall prepare the same by precincts. In all such cities and in towns having five thousand or more inhabitants, the voting lists shall be arranged by streets in alphabetical order, and the names of the voters on each street shall be arranged in the numerical order of the street numbers of their residences, so far as possible. All first voting lists shall be printed and available for public distribution not later than the first day of July in state election years. A sufficient number of voting lists shall be printed so that they can be furnished free of charge, upon request, to all duly organized political committees, and to all political candidates for public office in the various districts in which the city or town is located and for a reasonable fee, not to exceed the cost of printing such list, to any person upon request. Names shall be added thereto or taken therefrom as persons are found to be qualified or not qualified to vote. Notwithstanding the foregoing, the voting lists to be used at presidential primaries or any primary or election held prior to July first in any year may be that of the year preceding, revised as aforesaid.
Login To MyLegislature |
global_01_local_0_shard_00000017_processed.jsonl/36071 | Skip to Content
General Laws
Section 284. Whoever installs or maintains a machine or device mentioned in the preceding section which is of a type not approved as therein provided shall, if such machine or device fails properly to respond to the insertion or deposit therein of a coin or other article of value, be punished by a fine of not more than twenty-five dollars.
Login To MyLegislature |
global_01_local_0_shard_00000017_processed.jsonl/36081 | libHIK: clustering and classifying histograms
libHIK is a collection of functions relating to histograms, which are arguably the most popular representation in computer vision.
Changed to v 2.07 on Apr 27, 2012--updated for compile with opencv 2.3 and Windows compatibility.
When examples are represented / encoded as histograms in a problem or dataset, the histogram intersection kernel (HIK) is proved to be very effective in both clustering and classification of such datasets. The libHIK software package provides utilities that perform HIK-based kernel clustering, SVM classification, and the generation of bag-of-visual-words (BOV) representations of images.
There are four components within libHIK:
• (Since version 2.0) ICD (Intersection Coordinate Descent), a fast, reliable, and scalable HIK SVM solver.
• Only slightly slower than linear SVM
• Scales to millions of examples and tens of thousands of feature dimensions
• (Since version 2.05) support for exponential HIK.
• A kernel k-means clustering method that uses the Histogram Intersection Kernel (HIK);
• K-means and K-median clustering are also implemented in libHIK;
• A method that makes applying HIK SVM models extremely fast on histograms that are integers;
• We also provided ways to convert real-valued histograms to integer ones. Our experiments show that there are no obvious difference between these two – the integer version works better in many cases;
• Use the clustering and classification methods in the bag-of-visual-words (BOV) model;
• An implementation of the CENTRIST visual descriptor;
• Common visual codebook generation methods used in a BOV model , e.g. k-means or Gaussian Mixture Model, use the Euclidean distance to cluster features into visual code words. However, most popular visual descriptors are histograms of image measurements. It has been shown that the HIK is more effective than the Euclidean distance in supervised learning tasks with histogram features.
• In libHIK, we demonstrate that HIK can also be used in an unsupervised manner to significantly improve the generation of visual codebooks;
• In addition, we propose a one-class SVM formulation to create more effective visual code words which can achieve even higher accuracy.
• (Since version 2.06) The output values are normalized to the range [0, 1].
Source code and Manual
libHIK is written in C++, and can be built in both Linux and Windows.
The current version is 2.07, which can be downloaded from here. The file is compressed in the 7z format.
Install and usage instruction are available as a PDF (libHIK-2.06/libHIK/libHIK_v2.pdf) file in the compressed software package.
libHIK v 1.0 was published July 30 2009, updated to v 1.5 on August 10, 2009, to version 2.0 on June 17, 2010, to version 2.01 on July 30, 2010, to version 2.05 on Sept. 26, 2010, to version 2.06 on Apr 22, 2012, to version 2.07 on Apr 27, 2012.
Please check the ChangLog file for changes in editions. A license file is also provided in libHIK.
Technical papers
Technical details are explained in the following papers.
Efficient and Effective Visual Codebook Generation Using Additive Kernels [pdf]
Jianxin Wu, Wei-Chian Tan, and James M. Rehg
Journal of Machine Learning Research, 12(Nov), 2011: pp. 3097−3118.
CENTRIST: A Visual Descriptor for Scene Categorization [pdf]
Jianxin Wu and James M. Rehg
IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(8), 2011: pp. 1489-1501.
A Fast Dual Method for HIK SVM Learning [pdf]
Jianxin Wu
In: Proc. The 11th European Conference on Computer Vision (ECCV 2010), Crete, Greece, Sep. 2010, LNCS vol. 6312, pp. 552-565.
Beyond the Euclidean distance: Creating effective visual codebooks using the histogram intersection kernel [pdf]
Jianxin Wu and James M. Rehg
In: Proc. The 12th International Conference on Computer Vision (ICCV 2009), Kyoto, Japan, Sep 2009, pp. 630-637.
If you use the libHIK software, please cite appropriate paper(s) from the above.
For bug reports, inquiries, and / or suggestions, please send to me through wujx2001 AT
Jianxin Wu,
Apr 22, 2012, 3:38 AM
Jianxin Wu,
Apr 26, 2012, 9:45 PM |
global_01_local_0_shard_00000017_processed.jsonl/36083 | In the years after the rise of Exar Kun and Ulic Qel-Droma and the Great Sith War, the galaxy is in tatters. The Core Worlds of the Republic have been devastated, the Republic itself is in shambles and pirates and criminal empires are on the rise. Far on the Outer Rim, a new darkness is rising, preparing itself for Ascendance.
The Ascendance
the331st shy Anathema Ximota |
global_01_local_0_shard_00000017_processed.jsonl/36122 | Parodies and Spoofs and Courage: The Cowardly Dog Crossovers
Frequent Flyer by firefox b reviews
Dr. Vindaloo from "Courage the Cowardly Dog" uses his astounding powers of deduction to diagnose a patient experiencing a transformation into an animal. The new capabilities of that patient later avert a terroristic attack aboard an airplane.
Rated: T - English - Fantasy/Humor - Chapters: 1 - Words: 740 - Reviews: 1 - Favs: 1 - Published: 6/23/2011 - Complete |
global_01_local_0_shard_00000017_processed.jsonl/36134 | Author's Note: WOW! It has been a long time. For that, I apologize, again. I seem to be doing that a lot. For those of you who read Found, you know how bad my day has been, but oh well. Anyway, here is the long-awaited chapter!
Disclaimer: I don't own Twilight
"Billy Black, are you sure?" Please tell me no...this might not turn out so well if this was the same man that I thought he was. My breathing was close to hyperventilating. What on earth would he think? I was practically a third daughter to him....
Edward's eyes creased, looking concerned at how worried I was. My eyes were wide; I could feel my heart rate increasing considerably. "Bella, are you alright?" Carlisle, too looked concerned for my well-being.
"Are you sure?" I asked again; I needed answers. And fast.
"Yes, I am certain." Carlisle said, not a trace of hesitation could be found in his expression. So there was no doubt...none at all.
So Billy Black, Charlie's best friend, was head of the tribe. The tribe to which a pack of wolves belonged. This could not go over well.
Phone Call
"Bella, whats wrong?" Edward asked, hearing the hysteria in my voice as I double checked Billy Black's identity as head of the Quillettes. I however, was too busy with my unending thoughts spiralling downhill. Would Billy tell Charlie? No, Billy had some type of common sense.. but what could happen? Would he hate me? Would he hate Charlie for being my father? Too many questions..
"Billy and Charlie are good friends.." I whispered to the two vampires in the room. How many complications would this cause?
"And that is a problem why?" Carlisle asked, confused, as he shared a glance with Edward. Yep, they still were wondering if I was mental.
"I am like Billy's third daughter! What is he going to think if he finds out a part of me is his mortal enemy!" I exploded at the two of them...oh no that shaking was beginning again. Think, Bella, I told myself. You must stay in control.
Instantly, I closed my eyes, though my skin began to ripple, and flashes of pain could be felt through my back. I felt like screaming, just to do something to relieve the pain consuming me.
Faintly, I could hear voices in the background, soothing me, asking me to take deep breaths. I took their advice.
Inhale. Exhale. Inhale. I desperately hoped this worked, I was not ready to phase without help yet! What if I killed one of the vampires in the house?!
"Easy, Bella, its okay." Next to me, I heard Edward's calming tones to which my body responded. Slowly, the pain stopped, my skin ceased quivering, and I went back to normal.
For a few minutes, there was silence, other than my gasps of air and speeding heart. When I began to realize my surroundings, I noticed I was on the floor; I was clenching the rug in my hands. Even still, I kept my eyes tight shut, afraid that if I opened them I would go back into the fit.
"Bella, can you hear me?" Carlisle asked, concern etched in his voice. When I didn't respond, he spoke again. "Bella, we need to know if you are alright, just nod your head if you can."
Barely, I was able to move my head up and down fractionally. "Very good, Bella. Alright, I think you are fine. When you are ready, open your eyes."
Though it took a second, I was finally able to pull my eyelids open to see the lights of the study. However, when I tried to push myself up off the ground, I would have collapsed, had Edward's hands not caught me.
"Thanks." I mumbled out as he led me to a green plush chair in the closest corner. No one said a word as I hobbled; I then realized the entire family was in the room, minus Rosalie.
Putting my head in my hands, I gained control of the dizziness before I looked up to meet Edward's caring eyes not far from my face.
"Call Billy." I told them, knowing now I had no choice. Earlier, I had been worried what he would think of me, but now people's lives were at stake. The lives of the Cullens. Surely, they would be able to defend themselves while I was just a werewolf, but soon I knew other traits would start arriving, if the werewolves already had.
I could hear Carlisle's footsteps down the hall as he picked up a phone. Although he was rooms away, my hearing was already advanced enough to pick up on what he was saying.
"Hello." A gruff voice I recognized answered the phone.
"Hello, this is Carlisle Cullen." Carlisle said amiably. Silence was his only answer; for a moment I thought Billy was going to hang up, and I very-well didn't want to have to explain everything to Billy by myself.
"Cullen did you say?" Billy asked, though he knew exactly what Carlisle had said. Like always, Carlisle remained very friendly, though his tone suggested authority in every inch.
"Yes, that is correct." Dr. Cullen said coolly.
"Well, what do you want, bloodsucker?" Billy said harshly, beyond the terms of politeness.
" family and I would like to request a meeting with you and your pack?" Carlisle asked, still politely, but it seemed like he was trying his hardest to remain friendly.
It took a few moments, but he finally spoke again. I waited with bated breath for the verdict Billy was about to present. In my mind flashed pictures of me heading down to La Push alone; it wasn't a happy prospect.
"When. Where." Were the words of hope Billy spoke.
"Tonight, at midnight, by the treaty line." Carlisle answer Billy's scratchy voice.
The dial tone told us that Billy had hung up; moments later Carlisle walked into the room.
"Alright, you heard Billy." As he spoke, I realized Dr. Cullen was speaking almost solely to me. "Tonight we will meet by the treaty line, in order to discuss Bella here." And cue the blush; I didn't like it when a big fus was made about me.
"Go get some sleep, Bella, honey. We will wake you up when it is time to go." Esme said. "I think Alice.."
"I have clothes for her!!" Alice all but shouted as she finished Esme's sentence. With that, the little vampire grabbed my hand and pulled me out of the room.
It took a only a couple seconds to reach the next floor, and the mall. Or Alice's room, one of the two.
The place was huge, and stuffed to the brim with clothes, makeup, and tuns of pink. How Jasper did it, I have no idea. From amidst all of the clothes, Alice pulled down a single outfit.. a much too revealing outfit for pajamas.
"Alice, what is that?" I asked her, worry creeping into my voice as I eyed the excuse for clothes in front of me.
"Your pajamas silly." Alice said, as though it was the most obvious thing in the world.
I simply looked at her with an incredulous look on my face. She had to be kidding.
"Um, yeah, I will sleep in my clothes, thanks." I told her before turning around and marching straight out the way I came, not wanting to see the pout I imagined Alice was now wearing.
Upon exiting Alice's room, I realized I had absolutely no idea where I was supposed to go. Where did Esme say I was sleeping? I didn't think she had mentioned where...
"Need some help?" Edward suddenly asked. I jumped, startled by his sudden appearance.
Wide eyed and panting I gasped, "Don't do that to me!" He had knocked the wind out of me by his sudden appearance.
Of course, he just laughed. "Ha, just wait until Emmett tries to scare you. I wasn't even trying." I was barely focusing on the words Edward was saying, I was too lost in his eyes. Wait, what was I saying?
I shook my head to rid myself of those thoughts. Now was definitely not the time. "Um yeah, anyway, where am I sleeping?" I asked him, looking down the hallway as though there might be some type of sign to direct me.
"Here, come on, I will show you." Edward said, beckoning me to follow him. It was actually only a few doors down from where we were standing. "This is the guest room." he said, pushing the wood door open for me.
Inside was a simple bed, with a light blue comforter on it. It was perfect. "Thanks," I told Edward sincerely, before turning to climb in the bed.
"Well," Edward said, rubbing the back of his neck as he spoke. Clearly, he was uncomfortable in this situation. "I will just let you get to sleep....ah yeah. Good night Bella."
I however, was almost too much asleep to hear him as he left. For the moment my head had hit the pillow, I was off to sleep.
As the protector, I never needed to sleep for very long, it was almost like an internal mechanism. The book had never told me on whether I would sleep after my change, but it didn't really matter to me.
As such, I was only out for a few hours before I began to wake up again, only this time someone was talking.
"This is going to be the best prank of all time!" A voice said, instantly I identified it as Emmett's. Hmm, I wonder...
"Emmett! Don't!!" This time it was Edward speaking, or hissing, at his brother.
"Aww come on Eddie!" Eddie? That was new. "I never get to play this kind of joke! No one hear ever sleeps!" The pout was evident in his voice; it took everything I had not to burst out laughing.
"No Emmett. What will Carlisle and Esme think?" Edward spoke, trying to reason with his brother.
"They aren't here! That's what is so brilliant!" Yeah, trying and failing to reason with his brother.
Instantly, I devised a plan. There were a couple tricks up my sleeve.
Opening my mind up, I reached for Emmett's consciousness, listening to his thoughts. From his point of view, there was a can of whipped cream in one hand and a feather in his other. Across from him stood Edward, with a frown on his face.
Quickly I thought to Edward, "Its Bella, just play along." Though he was startled by my sudden thoughts, I could hear the agreement in his mind. Internally, I smiled, this would be fun.
Using my thoughts, I jerked the feather out of Emmett's hand and levitated it up in front of his face. His reaction was priceless.
"HUH? What? GHOST!!!" As Emmett screamed he ran out of the room, throwing the whipped cream straight on Edward's face. The moment Emmett shut the door behind him, I sat up, laughing at the sight.
Edward's face was coated with the white whipped cream, a scowl on his face. I couldn't help myself; I doubled over laughing.
"Say cheese!" I heard another, pixie-like voice say as Alice danced into the room, bearing a camera.
Edward tried to move out of the picture, but it was too late. It was caught on film for the rest of his life... or eternity.
"Okay, well now that everyone has had their laughs," Edward began, glaring at us all. "We have to meet the wolves in less than ten minutes so I suggest we all get ready."
He glanced at me before leaving the room, Alice right behind him. This was going to be an interesting meeting, that was for sure.
Author's Note: So I hope you liked it! I promise the wolves will be in the next chapter! I just wanted to have a little snippet of the Cullens just being themselves.. and that phone call needed to take place :D Review Please!!! Until next time...
~dreams of bubbles~ |
global_01_local_0_shard_00000017_processed.jsonl/36135 | Special thanks to Invader Johnny, without whom this chapter would probably have never gone up. Sorry!
Disclaimer: I don't own iCarly or the Teen Titans-I did take a lot from one of their episodes.
Freddie had had a dream. He'd been standing at Sam's grave, but it wasn't in a graveyard. It was in the middle of nowhere, maybe so she couldn't get near enough to any of the other dead to beat them up. Who knew. He remembered thinking how sad it was that she'd been alone the last few days of her life, and in death, she'd be alone forever.
Like all horribly vivid dreams, it disappeared the minute he woke up. Unfortunately, reality's problems pressed much harder.
"Where ishee? Whadja do?" Freddie asked a nearby nurse groggily.
"Honey, we've told you a million times. You need to go home. Your mother is driving us insane, and visiting hours are long over. Come back tomorrow. And bring someone else's mom."
"Mmkay." Seeing as that nurse was going to be of no use, he headed towards one of the nearest rooms and, praying he'd gone to sleep somewhere in her vicinity as opposed to a different floor, he hoped the room was hers. "Sam? Are you here?"
There was no answer. For reasons unknown to him, Freddie's heart sunk. That was stupid. Just because she wasn't in this room didn't mean...
He shuffled out and disturbed a few more hospital beds before the nurses chased him away. His mom intercepted, suddenly finding a connection with her son in their mutual fear of leaving the safe hospital and facing the real world's bacteria.
Sam wanted food. Badly. And if someone didn't give her some, she was going to get angry.
Getting angry, though, was easier than doing anything about it. She was in a full body cast and absolutely immobile. This was the part in the movies when some disgusting dog jumped on the bed and licked any exposed part of her it could find-namely, her eyes and her lips. She hoped her mother had left Frothy at home.
Sam wasn't really hungry. She hadn't been in a long time. But chewing gave her something to do other than lying around feeling sorry for herself. It was one of the most calming activities she-
A shadow fell over her. Glaring, she looked up and saw him. The stuff of her nightmares, the reason she'd had nightmares for the first time in her life.
She wanted to kill him.
He was in a hospital gown, now. His eyes were redder than before and he was shaky, relying on his portable IV pole for support. He was paler than he'd been the night he'd almost killed her, but thankfully less filthy. And somehow, he looked a lot weaker. But, seeing as her arms and legs were suspended from the ceiling, she supposed she did too.
"They got you too, huh. I remember you." That gravelly voice she hated so much. Her insides were burning with anger and disgust and felt like vomiting all over his pale, thin face. "You were that girl who told me I wouldn't get nowhere. Thought you were dead. Guess you almost are. Since you're probably not gonna see tomorrow, I'll just let you know you were right. I ain't gonna be great ever. Thought I would, you know. But once you get a coupla bottles down, seems like anything's possible."
She didn't care about his stupid drinking habit. She wanted him dead. Dead and far away from her.
"You were pretty strong for a little girl. But you didn't have a chance. Used to be a WWE champ. Used to have a pretty wife and a boy. Used to be great. Ain't great no more. It's all gone, thanks to the drinkin'. All gone..."
The look he gave her repulsed her. He pitied her too-this idiot who lost his whole life, pitied HER.
"I killed them, you know. Just like imma kill you tonight."
Maybe that was the cause for pity.
He took a deep breath and raised his arm. One blow was all it would take, and she was a dead girl. This was not how it was supposed to play out. She was supposed to have the upper hand at their next meeting. She was supposed to beat him. And how could she if she was dead?
The wrestler turned around in surprise. A plump, elderly nurse scolded him from the door of Sam's room.
"Marty, I told you not to go around visiting after hours! Go back to your room, you silly goose. I know this stay isn't very fun, but keep being strong, okay?"
He chuckled dryly. "I'm not strong anymore."
"Now don't go saying that, it won't help you get better at all. Come on, you can lean on me if you want, we're taking you back next door."
Next door? He would kill her in her sleep...
A little "mmph" made its way out of her throat. The kindly nurse turned and said, "Yes dear? Oh, you're that darling that-hmm, why don't we keep you nice and safe and locked up? Just to make your night a little easier. Sound okay?"
It was hard to give the nurse the death glare when she said that. At least she hadn't used the word "scared." Maybe it did sound somewhat okay.
The nurse waved goodbye, locked the door, and left with Marty. He pressed his face up to the glass in Sam's window before the nurse pulled him away. If Sam could've shuddered, she would have. It was no use trying to sleep; she spent most of the night wondering if the locked door would keep him out.
Carly heard about what happened after Freddie had made it home. Visiting hours were over, and she could barely fathom what Sam must be thinking about her. Some friend I am. She's dying and apparently I didn't care enough to go see her.
At first she had wondered whether it truly was Sam who had hit her. One of the downsides of having an overly violent friend was living with the fact that should Sam decide to go crazy, Carly was powerless. But if Sam was insane, then was it really her fault?
I should leave dealing with paradoxes to someone with no life.
Freddie sat next to her on the couch, quietly staring at the blank TV screen. He hadn't moved a muscle for about fifteen minutes, which made every twitch of Carly's seem exaggerated. She shifted uncomfortably and the air in the cushion whooshed out, amplified by the silence.
"She's going to die."
Carly had never before been afraid of Freddie, but his tone of voice was so unfeeling she couldn't help it. "You don't know that." What a lie. They'd known it all along. Even if her injuries didn't kill her, Sam could no longer live with what she had become. Short of putting her in a straitjacket and locking her in a rubber room, they would physically lose their friend forever. Mentally, she was already gone.
"I read somewhere..." Freddie's voice cracked. "When a horse is in intolerable pain, it'll try and throw itself down on the ground and roll over. Guaranteed death."
"Sam's not a horse."
"Humans do it too. We call it suicide."
"Shut up!" There was no force in that statement. Freddie didn't even flinch. "Please, Freddie. This can't be the end of the line."
He glared at her. "What do you want me to do about it?"
"I don't know. But there has to be something. The horse doesn't always die, does it?"
Sam had spent most of the night trapped somewhere between dreamworld and reality, but by the time dawn broke she had drifted off. Her fear had awoken parts of her she hadn't even known existed, and a little Sam convention was taking place inside her head.
They were all walking around her house, eating her food, exchanging banter. But there was something wrong about each and every one of them. One wore a pink bandanna and carried a journal around with her; Sam never remembered writing down a word outside of the occasional "do-it-or-you-fail-this-grade-Miss-Puckett" homework. Another (a very small one) carried a calculator and adjusted her glasses every five seconds, muttering, "No, no, that' can't be right." Still another sat in a corner sucking her thumb, spouting childish gibberish every now and then.
But one of them caught her eye immediately, only because she seemed the most normal. Aggressive and cool, she had that easy smirk that Sam hadn't been able to form her mouth into recently. Because the Sam she was looking at was not afraid.
Normal Sam was sitting at the kitchen table, studying a towering burger as if trying to find the ideal bite zone. Sam approached her warily. "Hey."
The other girl looked up and eyed Sam in disgust. "Oh. It's you."
Wouldn't it technically be you, too?
"SAM!" cried Pink Sam suddenly, dashing into the kitchen. "OMG no one told me you were here! This is so totally awesome! Did you bring Freddie? I've been writing about him in my diary every day, just for you! Wanna read it?"
"What the fu-"
"Watch your language," advised Bespectacled Sam. "She abhors curse words."
"Did you just say 'abhors'?"
"Abhor. To hate, despise, dis-"
"Everyone shut up!" yelled Normal Sam. The kitchen fell silent. "I've been waiting ages for her to get here. It's time to get down to business. Get over here and sit down," she spat at Sam, who did so.
"You've been waiting for me?"
"More like I've been trying to get you back in here. One little thing goes wrong-doesn't mean you can take over," Normal Sam snarled.
"Please, let's try to keep this a little professional," the nerdy one cut in. "Sam has a multifaceted personality. Any one of us can take over, you are not to only one given precedence."
"Quiet, tiny."
"All I'm saying," Smart Sam continued nervously, "is that you've been in control for Sam's whole life, and we've been hiding out in the recesses of her mind. Maybe it's time others had a turn. Personally, I don't like being so unused. I'm going to atrophy, and then who'll keep all of you in check?"
"No!" Sam cut in suddenly. "I want that one back! The old me!"
"Well, well. Couldn't face the real world, could you?" Normal Sam smiled smugly.
"What are you guys talking about? You act like I'm...one of you. I'm not. I'm the real Sam."
"No," explained the little one. "You are Cowardice."
"You see, most humans switch back and forth between different emotions, virtues, and aspects of their personality every day. Sam, however, has kept one face to the world for most of her life. That is, until you became powerful enough to overtake this one." She jerked her thumb at Normal Sam. "You used to be a vegetable, a little girl even smaller than me, and the most exciting thing you ever did was drool. And then that man came along and woke you up."
"Are you sure you're a part of my brain too?"
"Believe me," she sighed, "Sometimes I don't believe it either. Three hundred and twenty nine career detentions. Unbelievable."
"Thanks," grinned Normal Sam.
"Well, what do I do?" demanded Sam/Cowardice.
"You have to give the position back to Aggression," said Smarty Pants.
"Okay. Cool. She can have it. No problem."
"It's not that easy," growled Aggression. "You need to do it when you're awake."
And Sam's dreamworld dissolved. |
global_01_local_0_shard_00000017_processed.jsonl/36136 | Chapter Sixteen
Left alone with his holographic sidekick, Sam reached for the oxygen mask - no longer in constant use, but kept within easy reach for the inevitable occasional relapse. He drew a few breaths on it, avoiding looking at Al. The message was clear. He didn't feel like talking.
Al was not about to leave his friend alone with his dark thoughts. He'd learned something that should give Sam a crumb of comfort, and had only delayed imparting it because of the arrival of the others. Hopefully, their epiphany would help to make Sam more receptive.
"Good news about the nozzles, eh Sam?" Al bounced on the balls of his feet, as he tended to do when he was leading up to something.
"Yeah, sure," Sam muttered unenthusiastically. "I'm very tired, Al. Cut out or cut to the chase, huh?"
Al thought about reverse psychology. It often worked with the kid when he was in this sort of morose mood. Tell him, "It doesn't matter, it'll keep," and Sam would soon be bursting with curiosity and dying to know what Al wanted to tell him. This time, Al sensed that Sam would shrug and say, "Please yourself."
So Al decided just to give it to him straight. Even if Sam wasn't yet ready to feel consoled by the news, at least he'd know.
"I uh… that is, Ziggy has uncovered some information about Allegra Mancini, Sam." Al began. "She's accessed her medical records."
"Newsflash, Al," Sam countered, "The records show that she was alive and now she's dead. And it's my fault. Period."
"I don't think you gave her cancer, Sam." Al stated matter-of-factly.
"What?" Sam turned to look at Al, in spite of himself.
Yeah, that got your attention, didn't it kid?
"She didn't even know it herself, Sam. She had an appointment with the specialist this morning – that is Monday morning, your time. He was going to tell her she had throat cancer. The prognosis was six months, a year maximum."
"A year I robbed her of, Al." Sam maintained.
"She was a successful opera singer, Sam. She had a duff performance the other week and thought she'd just strained her voice. She went to the specialist for tests and that's what they found. Think what it would have been like for her, Sam," Al pressed. "She'd have either had to give up the career she lived for to try to prolong her life - slink off to die in obscurity; or she'd have tried to fight it out. Her performances would have suffered and with them her reputation. Instead of going out on a high as she has done, there would have been media gossip and bad reviews and all sorts of negativity. Either way, she'd have been miserable Sam. As it is, she is still regarded as one of the best opera singers ever to grace the Royal Opera House. Sales of her records are as high as they ever were in her lifetime. She has left a legacy of greatness."
"Are you seriously trying to suggest I did her a favor by letting her die now?" Sam accused.
"Put like that it sounds a bit callous, but that's what it boils down to Sam," Al wasn't about to back down. "And I keep telling you, you didn't let her die."
"Don't give me that, Al. It's just semantics. I knew that elevator was due to fall, and I was supposed to get everyone out. Allegra Mancini didn't make it out because I wasted time having crazy hallucinations."
Al wished he wasn't a hologram. Sam could do with a good slapping to bring him to his senses.
"Firstly, okay - the elevator crashed sooner than originally, because of the attempts to move it. That's true. But those attempts got everyone else out – so it was the right thing to do. The alternative was to do nothing and so change nothing. 'Cept you'd have died instead of Quincey. Not a great plan. Then again, we've long ago agreed that some higher power is controlling your leaps, Sam. If 'He' wanted you to get Allegra out, don't you think He'd have spared you the terrors? Would have timed it so you got her through the doors before the car took a nose dive? We assumed your mission was to save everyone, but we can't know for sure it was."
"Then why haven't I leaped, eh Al?" Sam countered. "Giving the nozzles a change of heart might have been a valid excuse to stay. But if I didn't fail, if I'm not guilty, then how come I still haven't leaped?"
"I think maybe because you have to accept you didn't fail, Sam. You have to come to terms with the fact that you did everything humanly possible, and sadly it wasn't enough for Allegra. That she wasn't meant to escape."
"Oh, I dunno, Al." Sam sighed. "Every time I close my eyes, I see that elevator disappearing into the void below. I can hear Allegra Mancini screaming. It's like she's crying out to me to save her, and I reach down, but she's too far away, she's moving too fast and I… I can't…"
Sam's breath was coming in short stilted sobs; he couldn't get the words out. Tears filled his eyes and spilled down his cheeks.
"It's okay, Sam, let it out. You need to let it go." Al encouraged soothingly. He wished he could swallow his friend in a huge sympathetic hug, but he was only able to stand by and offer what words of comfort he could.
Sam continued to sob, bemoaning over and over his inability to keep Allegra from her date with death in semi coherent ramblings.
Al let him rant and cry, until at last the tone of Sam's comments changed, as Al had been sure they would.
"It's not f-f-fair, Al," Sam complained again between sobs, "Why did she h-have to die? She sh-shouldn't have died. I should have s-saved her. I t-tried to save her."
Al ceased on that, and emphasized it. "Yes, Sam you did. You tried. You tried hard - harder than most men would have. You did your best."
"I... I tried..." Sam repeated, as if considering the possibility for the first time. "Tried to save h-her..."
"Yes, Sam," Al confirmed again, "You did everything you could. Right up to the last second, you kept trying... "
"I thought I could save her... I did all I could to save her..."
"Listen to yourself, Sam. You did all you could. You did your best. You have nothing to feel guilty about. Nothing. You didn't give up on her."
"I didn't give up." Sam finally sounded like he believed himself. "I tried as long as I could..." His sobs were slowing now, which was just as well as the outpouring of grief had caused considerable strain on his bruised ribs. He was wincing, even though he wasn't aware of the pain on any conscious level.
"That's right, Sam. You need to forgive yourself. You did an amazing job just to get everyone else out. You should be proud of that. It was a tough assignment, pal, and you did good. You did better than good. Hang on to that, Sam. Six people are alive right now who wouldn't have been but for you. And I know it's only a shred of compensation, but you honestly wouldn't have been giving Allegra much of a life had you saved her. If the Powers That Be decided it was better for her to go with a bang than a whimper, then we really shouldn't argue, should we?"
Sam sniffed and stifled a cough. He shook his head slightly.
"I guess not..." Sam wiped his eyes with his wrists, and then settled back into his pillows, physically and emotionally drained.
"Attaboy, Sam, that's the spirit," Al encouraged, relieved that his friend was emerging from under his dark cloud of misery.
"Thanks, Al," Sam whispered, not needing to elaborate.
Al swiped his hand in the air dismissively.
"Any time, buddy." He smiled. His instinct was telling him the same as Sam's seemed to be for his friend looked at him with his head tilted slightly on one side.
"Feeling better, Sam?" Al asked, but they both knew what he was really asking.
"Getting there," Sam replied.
And leaped. |
global_01_local_0_shard_00000017_processed.jsonl/36137 | A/N: I wrote this years ago, after I had just finished playing The World Ends With You. I'm just wondering what people think. So if you take the time to read, please take the time to review!
Axiom wandered the streets of Shibuya, trying to get used to her new home. Everything here was so different – and everything she hated. Completely ruled by trends, with no individuality to speak of. She was her own person – always had been, always would be. Shibuya was the exact opposite of where she would want to live. It was noisy, with no architectural merit, crowded with people who all desperately wanted to be exactly like the person who was standing right next to them.
She stopped in front of a few stores, wondering if anything would be in her price range. She doubted it, but didn't care. She'd find something to wear. Her overly baggy cargo pants and t shirts were sure to get her through the rest of her teen years. At 15, she was completely unoccupied with looks, friends, and most of humanity. She didn't have time for them, just meandering around. She had her own things to do. Her music played in her ears as she wandered around the sprawling city.
Eventually, she got hungry. She stepped into a small café, choosing the most secluded table she could find. Just as she decided what she was going to order, a gaggle of giggling girls walked in the door, laughing and generally being airheads.
"Oooh, I don't know what to get. What are you getting?" one squealed. Axiom snorted, rolling her eyes.
"Did you say something?" one said venomously, turning to Axiom. She flicked her blonde and blue hair out of her face, restraining herself.
"I didn't say anything," she said flatly.
"But I heard you! You had to say something," she insisted, pouting. A few more turned around, glaring.
"Fine. If you must know, I was mocking you," Axiom said shortly.
She stormed out of the tiny café angrily, no longer willing to deal with the bubble-heads. She wasn't watching were she was going, and her feet were carrying her quickly across the street.
A honk.
A screech.
A crash.
A hand.
A jerk at her waist.
The sounds of the street assaulted her as her ear phones were ripped from her ears. Pain lanced across her back, then her shins, wrists, and palms.
"What are you, crazy?" a voice demanded.
Axiom rolled over, arms pressed tight to her stomach. People were talking loudly all around her. She longed for silence. She could see, but everything was blurry, and her eyes wouldn't focus on anything. Her head hurt, and blood – her own – oozed everywhere. The red liquid was swelling from a cut above her eye, beading on her hands, and tingling and staining her back and sides.
"Hello? Can you hear me?" The voice was worried now.
Axiom nodded weakly, sending pain shooting down her spine. "Yes, I can hear you, no I'm not crazy," she qualified. She knew that her injuries were making her snappier than usual.
The other voice – male, she recognized – sounded surprised. "Uhm, okay. Can you get up?" Her vision began to clear. She saw and felt a hand on her shoulder. The fingers were long and pale, attached to a thin arm. The face was pale as well, with a spike of orange hair poking up and around it. It touched his ears at the longest point, falling around headphones around his neck. She knew someone behind the boy wouldn't see the head phones because of his absurdly large collar.
"Yes, I think so." Axiom grimaced, and placed her hands on the side walk, pushing herself to her knees.
"Good. I'll...uh...hang on," he said. Axiom slowly gathered her bearings and returned to her surroundings. The people had already moved on, no longer looking at her or the boy.
"All right, bye," the boy was saying, and then turned to face her. "Let's get out of here. You need to sit down."
Axiom wasn't really ready to trust him, but her body ached, so she wasn't going to take chances. If the blood flow didn't stop soon, she might pass out. Being alone was not a situation she wanted to be in. The boy lead her down a few alleys, and before long, they were on a part of town Axiom didn't know existed. It was dark and secluded, with only a few shops and fewer people.
He led her just a bit farther, until they stopped at a huge mural painted onto a wall. It was a masterpiece – there were so many vivid colors she could almost hear the cacophony of sounds from each color. The reds were screaming their thoughts, yellows speaking soothing words, blues crying their sorrows. The greens twittered with excitement, purples offering advice, oranges watching it all with amazement. Blacks and grays lurked in the background, creeping and whispering terrors of the night.
She glanced at the boy and he was glaring intensely – seemingly at the mural. But she looked through his eyes – his heart was not with this mural. His heart was somewhere else, thinking of some far off turmoil. She stared at him, wondering just how he had come to find her...and save her.
Eventually he glanced at her. "Amazing, isn't it?" he said, staring at the mural this time. His eyes grew cheery, and he looked like a different person. She had not noticed before that his face was full of angst – that he was always glaring at something or other that no one else could see. "This is CAT's monument. For a long time, it was what I lived by. All CAT all the time." He chuckled. "Then I learned it wasn't so great after all."
He turned his face toward her. "I'm Neku Sakuraba. Welcome to Shibuya."
"Axiom Allegory. Thank you for saving my life," she said, blonde bangs covering her purple eyes.
The orange haired boy chuckled again. "You're names a bit of an oxymoron, isn't it? Truth Myth. Isn't that what it basically means?"
She almost smiled, remembering what she used to say when someone mentioned that. Now it was painful to think about the people who have given her the name. "I'd say I hated my parents for it, but it's impolite to disrespect the dead," she said flatly, still staring at the CAT mural.
Neku tensed. "I'm sorry. I didn't know. Your name is perfectly fine." A pause, then, "How long ago did it happen?"
"Just a few weeks ago. Today was the first day I chanced wandering around Shibuya by myself – not the greatest idea, apparently."
Neku bit his lip. "Guess not. It takes a while to get used to living here."
"Yo, Phones! Where's the chick?" a loud voice called out with no warning.
"Here, Beat!" Neku called, seeming exasperated. "You crude good for nothing lout…" he muttered under his breath. Axiom turned around to see the other boy that had called out.
He was taller – taller than both Neku and Axiom – with large muscles and a bright face. How someone like him and Mr. Sakuraba here came to be acquaintances Axiom would never understand. He was accompanied by a slender girl with killer fashion sense, who was laughing at the boy – the one Neku had called Beat. On his other side was a tiny girl who resembled the tall boy, with blonde hair and an adorable face. She had a bell charm around her neck that tinkled daintily as she walked.
"Axiom, meet Beat and Rhyme Bito," he indicated the tall boy and the shorter girl, "and Shiki Misaki." The black haired girl carried herself well, proudly. The trio kept walking closer to where Neku and Axiom were standing.
The youngest – Axiom assumed that tiny Rhyme was the youngest – immediately looked concerned. "What happened?" she asked, voice as angelic as her face.
Axiom remembered that, in addition to her body being sore, it was also covered in blood, a majority of it fresh.
Shiki answered for her. "She was nearly killed not that long ago. Neku saved her life. That's why he asked us to come – you know how clueless he is around girls." Rhyme and Shiki giggled, and Beat boomed a laugh. Neku glared, but did not blush. Axiom took little to no notice of the exchange. As far as she was concerned, these four would probably turn out to be like anyone else.
"Shiki, can you take her to your house and get her cleaned up? Eri can help, but I don't really want to deal with my parents asking why I'm bringing a bloody girl home."
Beat grinned nastily, sending Neku a significant look. Neku glared daggers. Beat kept on grinning. Once more, Axiom took no notice, but Shiki was talking to her.
"No problem, Neku. I'll tell Eri to bring over some things for you to try on."
Axiom nearly rolled her eyes. "Don't bother. I'll just wear this."
Shiki gagged. "I won't have any friend of mine walking around like a zombie!" She was appalled, much to Axiom's surprise and flattery. Friend? That was something to appreciate. First day in this town and someone who already considered her a friend. She wasn't completely sure how it had happened, but it had.
"Good. Well, just call Eri and get her cleaned up," Neku said after glaring at Beat for a few more moments.
Shiki immediately pulled out her cell phone, dialed, and was talking within ten seconds. "Eri? It's Shiki. Sorry I had to dash like that – hope you managed without me. But anyway, I've got a little bit of a fashion crisis here. Care you help?" A moment's pause. "Perfect. Well, Neku seems to have made himself a friend in serious need of our fashion expertise. Can you come pick us up?...Yeah, just in Dogenzaka. Five minutes max, all right? Call me if you get stuck in traffic." Shiki quickly snapped the phone shut, grinning at Axiom.
Beat suddenly paled. "Oh shit. I know that look! Don't say it, please don't say –"
"Make over!" Shiki and Rhyme shouted, giggling.
That sounds lovely, Axiom thought.
"Oh, come on, just get her some new clothes and get out! No need to torture her, Shiki," Neku laughed. Axiom saw that flash in his eyes – the same he had when looking at the mural. She wondered what the connection was.
"Please, Neku. Call it a girls' night out. A little welcome party, for just us. You guys can do...whatever it is you do. We'll be busy." Shiki said. "Oooh, look, here's Eri!" Shiki waved her friend down. Axiom reluctantly followed Shiki and Rhyme, both already chattering excitedly. She glanced uncertainly back at Neku. He smiled at her – and the flash in his deep blue eyes was meant just for her. |
global_01_local_0_shard_00000017_processed.jsonl/36141 | A/N / This takes place the night before the events in Break Even unfold.
Alfredo's heart always skipped a beat when he looked into her eyes. She noticed him staring at her and gave a gentle giggle, turning her eyes away in slight embarrassment.
He smiled to himself a little. How in the world did he get so lucky?
"Y-you… I mean, be careful driving home tonight," he softly called after her. Colette was nearly out the door of the restaurant when he spoke, and she stopped for a moment to turn around and face him.
"I will, mon amour, don't worry," she replied with a sweet smile on her face. Her eyes glittered and danced and Alfredo felt himself blushing at her gaze. She gave a soft laugh and held out her arms. "Come here, lily-liver."
Alfredo stepped forward and wrapped his arms around her, placing a hand on the back of her head and slipping his fingers through her silky hair. He pressed his cheek to her head and closed his eyes. He could feel her breath melting into his skin. She eased out of his grasp for a moment, then lifted her hands up and pressed them to his cheeks, pulling him down for a kiss.
His nerves spiked, his skin tingled, every hair on his body stood on end. The feeling quickly dissolved into intense warmth coursing through his veins, and his nerves suddenly felt like they were melting and going numb. Colette held him firmly, pulling him so close that they could feel each other's hearts each beating violently. Alfredo gripped her head and waist, and she his face, and it seemed as though they'd never let go.
When they finally separated and locked gazes, Alfredo felt himself slightly choking on his beating heart. She only smiled at him, moving her hand to the back of his neck, knowing it made his hormones go haywire.
"Alfredo," she whispered.
Alfredo's eyes widened vaguely. "What?"
"Can I tell you something?"
There was a slight pause. Alfredo wasn't sure whether to be nervous about that question or not. "S-sure, yeah. I mean, of course, Colette." He smiled a bit. "You can tell me anything."
She stared seriously up at him. "If the only thing in the world I had was you, I'd still have everything I've ever wanted." She pressed her cheek to his chest. "You know that?"
Alfredo's heart swelled. "Yeah, I knew that, I guess." He gave her a squeeze and let out a chuckle. "That kinda sounded like one of those sappy love quotes you find on the internet."
Colette laughed in return and pulled away. "That's because it was!" Alfredo was blushing despite the fact that he knew it was a bit of a joke. It didn't matter how cheesy it sounded – whenever Colette spoke that way of him, he was overwhelmed with the love he had for her and it never failed to make him blush. He placed a hand on her shoulder and tenderly led her out the door to her bike.
"I mean it, though," he continued, "you stay safe on the road. There's some… weird people out this time of night."
"I know," she easily replied, securely strapping on her helmet.
"Drunk people, a lot of times," Alfredo carried on, gesturing with his arms to emphasize. "They shouldn't be out on the road, but they are." Colette was playfully rolling her eyes at Alfredo's over-protectiveness. "I'm serious, I just want to make sure you're–"
"I'll be fine, Alfredo Mitchell Austin," she assured him once more. She pinched his cheek and started up her bike. "You drive safe, too." She smiled once again before pulling her visor down. "Je t'aime, mon amour. Bon nuit."
He watched and waved as she took off down the street, waiting until she rounded the corner out of sight before turning around to walk back and lock up the restaurant.
It was unusually quiet on this side of the city tonight. Colette noticed the lack of drunk Parisians partying in the alleys, or groups of commonly-spotted crack heads rolling joints and smoking pot outside of abandoned storefronts. For once in a very long time, her ride through this end of Paris wasn't as scary as it normally was.
She pulled up to an apartment home that had been built back in the late 1800s and was originally a textile factory. The name of the company who owned the factory had been painted on the front of the brick building, and was still faintly visible to this day. Some of the apartment lights were still on and cast an eerie glow down onto the ground below. Colette parked her bike on the side of the building and chained it there, then proceeded up the rickety metal steps that led to the upper levels of the apartment house.
She fingered the apartment keys in her pocket and opened the door leading inside the building, which brought her to a hallway where the doors to several of the apartments were neatly lined up along the walls. She scanned the doors for Apartment 54, and she happened upon it almost immediately.
Gently, she eased the key into the lock and turned the handle to let herself inside. The air in the apartment felt heavy and thick the moment she walked in. She sniffed. Cigarette smoke.
"Colette, I had no idea you were coming tonight," a scratchy male voice called. She saw a hand drop over the side of the recliner in front of the TV, and in it was a cigarette still smoking.
She placed her purse and bike keys on the bar and peeled off her jacket. "I figured I owed you a visit. It's been a couple weeks."
The man chuckled. His laugh was rough and dry. "Yeah, couple weeks seems like forever when you want something bad."
Colette walked over to the recliner, stood in front of it, and folded her arms. "That's why I'm here, Sam."
The young man slouched in the chair had a few days' growth of beard, and his blonde hair was wild and tangled. He grinned at Colette, showing off the nearly perfect set of straight teeth that he had.
"How in the world did I get so lucky?" Sam mischievously sniggered. Colette rolled her eyes and stuck out her tongue. "The boyfriend don't mind?" he then asked, slipping his hands behind his head. The smoldering cigarette dropped onto the floor.
Colette smirked and inched closer to the chair. "The boyfriend don't know." Sam raised his eyebrows.
"Ahh," he replied with a snicker. "You're a sneaky little kitten, you are." Colette seated herself on his lap and pressed her nose to his. He instantly responded by placing his hands around her waist. She gave a slight shrug as she closed her eyes and rested her lips near his mouth.
"I never loved him anyway," she whispered, slipping her mouth into his as the words, thick with poison, dissolved off her lips. |
global_01_local_0_shard_00000017_processed.jsonl/36142 | So, this turned out being absolutely nothing like what I set out to write for what will most likely be my one and only ACGaS. Originally, it was set on Christmas eve, it was James who was missing, and it was a one-shot. But then I decided I'd rather write a story where everyone was worried over my favourite character, Tristan - as that never seems to happen too much, bless him - and it grew. Because of the large number of fics I'm working on right now and the fact I am still in full-time education, I will be updating this based on the number of reviews I get, while still keeping in mind that this isn't the most popular fandom in the world.
ANYWHO, on with the story.
The moon continued its haunting ascent over the hills. The clouds cleared, leaving the air uninsulated and frosty. The icy roads glistened in the moonlight.
In Skeldale House, Helen sat chewing her lip on the sofa, staring distractedly through the gap in the curtains. Siegfried, sat on the other end reading the newspaper, glanced up. He folded the newspaper into his lap and leant towards her.
"My dear Helen, whatever is troubling you? Here we are, finally a quiet evening, and rather a pretty one I might add, and you don't seem able to enjoy it at all." His brow furrowed. "What is it?"
She looked at him, and then to her lap, now chewing the inside of her mouth. "It's James. I'm certain he should be back by now, he's never usually this late."
As if to emphasise her point, the clock chimed ten.
Siegfried smiled a little. "Not to worry, my dear. You must remember that my little brother is also absent. But you don't see me letting my mind run away with itself." He patted her knee, his smile broadening. "James will be back safe and sound, you mark my words."
Helen smiled, and eased into the seat a little.
The front door opened. Helen rushed out into the hall.
"James," she sighed, relieved. She went to him and helped him off with his coat.
"Hello, Darling," he said, cheerfully. "Sorry I'm late. Trist wanted to stop off at the Drover's Arms. I thought it would only be for a few minutes." He had taken off his coat now, and hung it up, still looking at his wife. "Eventually I had to just leave him there. A right state he was in too!"
"But how will he get home, then?"
"Oh, he's got the car." James put his arm around her waist and began to lead her upstairs. "I walked back. That's why it took me so long."
"But James, it's awfully far."
"I know. I'm awfully tired, and I want to get to bed."
"Morning, Siegfried," said James, entering the living area.
"Good morning, James. Had a good sleep, I trust?"
"Yes, thanks." He sat down at the table and poured himself some tea. "What time did Trist get in in the end?"
"Oh, goodness knows. After I went to bed."
James laughed. "A lay-in for him, this morning, then."
"Not if I can help it," said Siegfried, getting up.
James smiled to himself as his partner left the room, and picked up the newspaper.
Mrs. Hall had just come in with James' breakfast when Siegfried came storming down the stairs again.
"He never came home!" he bellowed, bursting into the room. "That scoundrel has completely shirked his responsibilities. He spared not a thought for his work, not to mention the people people who are… relying one him, who may be worrying about him, who have utterly no idea where he may be." He lowered his voice a little as he sat down. "You know, I may actually kill him this time, James?"
James smiled. "Not to worry, Siegfried, I'll go out and find him after breakfast."
"Would you? Thank you, James. And when you find him, would you make sure he knows what's coming to him?"
James parked up next to the Drover's Arms and looked around. No sign of the car; Tristan had definitely left last night.
The public house seemed to be open, even at this time of day. James got out of the car and went in. One or two patrons sat sombrely in corners alone, quietly nursing their drinks. They stared at James as he walked up to the bar, and he smiled uncertainly back.
"Ay-Up, Mr. 'erriot. What'll it be?"
James smiled again, resting his hands on the bar. "Nothing for me, thanks. I'm here to ask about Tristan."
"Young Mr. Farnon?"
"Yes, that's right. He was here last night, wasn't he?"
"Aye, that's right. If I remember rightly you were too, Mr. 'erriot."
"Yes. But I left."
"Aye, I remember. Had to throw Mr. Farnon out, Mr. 'erriot."
"Throw him out?" said James, surprised. "Why, whatever did he do?"
"Didn't do nothin', Mr. 'erriot. But he were gettin' too drunk, like. He were a danger to 'imself."
"Oh, I see. What time was this?"
"Just past midnight."
"Oh, alright. Thanks very much."
"No problem, Mr. 'erriot."
Remember: review if you want more |
global_01_local_0_shard_00000017_processed.jsonl/36144 | Hello any readers! This is my first fanfiction for Inuyasha, and the idea just came to me one day. This may develop into a series of one shots, primarily focusing on the three year gap at the end of the series. I tried to maintain characters as best I could. I hope you enjoy!
It was a well-known fact among the few friends he had that Inuyasha did not shed tears. Or rather, he did not allow himself to cry easily. Myoga, who had known him the longest, had never seen him cry during childhood or adolescence. He had not cried when his mother died, or when he'd been insulted by demons or humans. His reaction had always been anger and violence.
Indeed, even his current companions could only remember two instances when he'd been broken enough to cry.
The first had been when they'd nearly died, and had been saved from poison at the last moment. Kagome's apology for worrying him had been the final straw, and his eyes had finally watered with relief.
The second occasion had been the final death of Kikyo, and Inuyasha's emotions had overflowed. He had wept openly and with his heart exposed.
But those had been the only times that Sango, Miroku, and Shippo had seen Inuyasha cry.
However, there were instances when Shippo in particular had been sure he was on the verge of breaking down.
After Naraku's defeat, when Inuyasha had emerged from the well without Kagome, he appeared to be in a state of shock. He'd immediately jumped back inside, growling in frustration when he remained in their era. Shippo, too, had been surprised.
"What's happening, Inuyasha? Where's Kagome?"
He hadn't responded, only let out another frustrated growl as he jumped and failed again.
He had continued to jump into the well until Sango and Miroku returned, and they demanded answers.
"Inuyasha! What happened to Kagome? What became of the Shikon jewel?" Miroku had asked, seizing hold of Inuyasha's right arm before he could jump again.
He hadn't responded immediately, glaring fiercely at the well and breathing heavily.
"The jewel is gone. Kagome destroyed it."
"Destroyed it?" Sango asked, shock displayed on her face.
"She wished it away. Then all of a sudden we were on her side of the well. Then I just…" Inuyasha shook his head again in confused frustration. "The well brought me back here. And now," he gave the well a frustrated kick, "it won't let me back."
"What?" Sango had cried, but Miroku immediately became pensive. Shippo hadn't liked the look on his face.
"Kagome-sama is safe in her world?" Miroku had asked Inuyasha, who'd barely turned toward him to answer.
'Yeah, she's with her family. She's fine. I just need to-"
"Inuyasha," Miroku had begun slowly, "it is possible that without the Shikon jewel, you will not be able to use the well any longer."
Inuyasha had spun around to face him, angry denial evident on his face.
"Baka! I've used the well loads of times, and I never carried the jewel! Don't say stupid shit-"
"But Kagome-sama was unable to travel without it. Its power may have been what permitted you to go to her." Miroku looked down at the well, sad resignation on his face. "Kagome may not be able to return here."
"Bullshit!" Inuyasha suddenly turned to look into the well, as if expecting Kagome to appear at any moment.
Of course, nothing had happened.
"Inuyasha," Sango began, "you were gone for three days."
He whirled around, stunned.
"Was Kagome-chan happy to be back in her world?" Miroku asked softly.
Inuyasha looked between them, still shocked.
"She and her family were crying when she came out. They'd been calling for her while she was gone…" He looked back into the well once more. "They were so thankful to have her back."
Miroku had started to speak once more, but without warning Inuyasha had dashed away from the well, leaping into the air with only a grunt of farewell.
Over the next few weeks, Inuyasha had sought out Kaede's advice, Myoga's, and even Totosai's. His desperation, though he had kept it well hidden, had grown as each elder had given him the same response: none knew how to fix the well.
Shippo had watched from a safe distance as, every three days, Inuyasha would leap into the well, only to emerge frustrated and angry. Sometimes he would try multiple times, and when he came out he would kick at the well in his fury.
Once, he had gripped the sides of the well with both hands, his form hunched over. He gripped the wood so tightly it started to splinter, and he finally released it, breathing heavily.
He'd walked away swiftly into the woods, and Shippo hadn't seen him again for many days, as he was due to go off and train.
Weeks dissolved into months, and still Inuyasha continued to jump into the well. Shippo was aware that he was the only one who knew about this continuous activity, but he did not mention it to anyone. There was no need to aggravate the hanyou further, as his temper was even worse than before.
Inuyasha went off with Miroku and Sango on extermination complaints, and seemed to find a sense of purpose in the work. It was ironic, considering how he'd previously hated such ventures. When Sango became pregnant with their first child, Inuyasha had gone off on many missions alone, easily ridding the town or temple of a demon and collecting whatever pay Miroku had charged (though he usually only remembered if it was food).
But as the one year anniversary of Kagome's departure approached, Inuyasha never cried for her absence. He'd raged, early on, and avoided Miroku and Sango sometimes when he felt their pitying looks. He submitted to fights with Shippo to help with his training, and sometimes and retaliated too harshly. But he'd never cried for the loss he felt every day.
However, it seemed as though fate was determined to break him.
It had been over a year since Kagome's disappearance, and the pair of demon slayer's had set off.
The new moon was that evening, yet for some reason, Inuyasha felt restless, and wanted to slay something before he was made powerless.
The demon had been terrorizing a small village with a terrible illness. It threw an infectious powder into the faces of its victims, who would then suffer for a few days of terrible fever before expiring. To making it worse, the fever supposedly caused terrible hallucinations and rambling in people, who needed the care of others for any chance of recovery.
Miroku's sutras sent out the weak demon, and it immediately made its way toward the armed hanyou. Seeing the terrifying sword Inuyasha held, it had panicked and made a break away from him. Swerving to the left, it sent a bomb of powder right at Inuyasha, he leapt away with ease. The demon grinned, realizing that the hanyou did not realize that the powder was airborne, and spread easily.
Preparing multiple attacks, the demon launched bomb after bomb of the smoky powder at the hanyou, deliberating missing him.
Inuyasha, for all his strength, also needed to be injured before he learned in battle. He dodged halfheartedly, before realizing that the demon had surrounded him with the smoke. Unable to prevent it, he inhaled, and felt the burning sensation immediately.
Growling, he unleashed his windscar and eradicated the little twerp, who disappeared with a disbelieving squawk.
Inuyasha brushed off Miroku's concerns, and focused on returning to the village. He'd returned to the small hut he'd come to consider his "home." It was away from the village, and small, but it suited him.
The sun was about to set when he took note of his discomfort. He was unusually warm, and shed his haori. He pulled down his single window cover, breathing deeply. He was still far too warm.
As the night stole over the land, his temperature rose further still. He opened his white shirt as his hair darkened and his ears changed. By now, the heat was becoming such a problem that he was tempted to sleep outside. Unfortunately, in his human form, it wouldn't be wise.
Out of nowhere, Kaede pushed open his door, followed closely by Miroku, slapping sutras on it and without a moment's hesitation grabbing the untransformed Tessaiga.
"Miroku, what're you-"
"I suspected that the poison would have an effect on you tonight. It seems I was right."
"I'm fine! Now get out and let me-"
"Inuyasha this poison progresses too quickly to leave you be. You will most likely require my assistance tonight. Hoshi," Kaede addressed Miroku, "I can handle this from here. Return to you wife and children."
"It shall be fine. Go." Kaede instructed him out, and after speaking to him briefly, placed the Tessaiga in the door, completing her protection around the hut.
"I don't need your help! Just leave me alone and-"
"You are perspiring at an alarming rate, your eyes seem glassy, and your breathing is labored. You are to remain in this hut with me until this disease passes. You needn't argue," she said at his outraged expression, "for presumably you will overpower the poison once your demon powers return. And you did not plan on leaving this hut for the night, did you?"
At his silence, Kaede settled herself one the ground beside him, unrolling her own mat to sleep on.
He glared at her as she made herself comfortable, taking out cloths and water she and Miroku had brought.
With a snarl, he flipped himself onto his side, presenting her with his back and determined to fall asleep with ease.
"Good, rest. That's all you need to do."
"Shut up, old hag." Inuyasha muttered.
It was about an hour after her arrival that Kaede's presence became a blessing. Inuyasha fell limply onto his back, panting heavily and sweltering. His left hand clutched at his chest over his heart, while his right lay at his side, clenching and unclenching.
Kaede dutifully wiped his brow and offered him water when he was willing to drink it.
After two hours, he started to speak. Kaede had tried to respond to his voice at first, but realized after a few sentences that he was not talking to her.
"This is why I hate being human. So fucking annoying…"
"It is a burden you bear, Inuyasha. Be grateful it only occurs once a month-"
He started to chuckle past his gasps, causing her to break off and regard him carefully.
"Yeah, o' course Myoga's run off. When does the coward ever stick around?"
"Myoga has not returned to the village for many weeks, Inuyasha. He is with Totosai-"
"It's fine! It's not as bad as with that stupid spider. This is nothing."
His statement was negated by his breathless words and shaking body. His clutched at his heart more forcefully, grunting with the strain.
"You could let me use your lap again, if you're so concerned."
Kaede blinked in confusion, dabbing more sweat from his brow.
"What are you speaking of, Inuyasha?"
He turned his head toward her, his mouth open to reply, when he stopped and stared at her for a long moment. He blinked slowly many times, as if clearing his eyes.
"Not… here."
"Inuyasha, you are ill, and you are not coherent. Remain still and rest-"
He turned away from her abruptly, angling his head into the ground. His breathing hitched alarmingly, and Kaede reached to turn him again to force him to drink. He growled menacingly at her touch, although it lacked the usual punch of his demonic self.
"Leave me alone!"
"Inuyasha, you need to drink. You must remain hydrated to combat this-"
"Why?" he hissed.
Kaede blinked, not expecting the question.
"Because this poison has spread throughout your body and until you regain your-"
"So fucking stupid! Why the fuck would you leave now? It was over! We were finished! There," his breathing hitched again, "there was nothing left to stop us! Nothing to get in the way!" His voice broke, and he let out a frustrated cry.
Kaede stopped dabbing his face for a moment, and looked at him more closely. His eyes were squeezed shut, his teeth clenched, and his lips were peeled back and he continued breathing heavily. He slammed his right fist onto the ground.
"Inuyasha, you must calm yourself-"
"And it won't work! It just needs to work once! I won't even try to come back! I'll stay there, it never has to work again!"
His left hand rose to cover his eyes, and his gripped his own face tightly.
"Just once. Just let me through once. I need to. I need to. I need to…"
He rambled the phrase over and over again, shaking his still covered face back and forth.
Comprehending his new anguish, Kaede tilted his head forward and pushed the protruding tip of the container past his lips, forcing the water into his mouth.
He seized up at first, moving his hand from his face to shove the container away. Kaede caught and forced his hand back down, and was alarmed at how weak he was that he could not fight her hold.
He stopped struggling after a few moments and drank long gulps. Kaede pulled the bottle away and carefully wiped more sweat from his face and chest. After some hesitation, she cautiously thread her fingers through his bangs.
Inuyasha let out a low moan, turning his face away from her into the ground again. He did not move face enough for her to miss the wet streak of tears on his cheeks.
"Come back. Dammit, just come back."
His tears were not womanly or blubbering. He fought his own sobs with frustrated grunts and slamming fists. He took shuddering breaths and raked angry hands across his face to wipe at the tears. Occasionally, anguished snarls would escape his lips.
He brought his left hand back to his chest, and dug his nails into the exposed skin above his heart. Alarmed, Kaede grabbed his hand and held it away, holding it firmly when he tried to rip it free.
"It never stops. Make it stop. I don't want to feel it anymore!"
Seeing the deep scratches Inuyasha had made with his human hands, Kaede was grateful that he lacked his usual claws.
As morning finally approached, Inuyasha felt spent. His chest ached, and his body was still overheating, but after hours of thrashing he couldn't shift himself any longer. His eyes stung, though he wasn't sure why. All he wanted was for the pain to stop. He felt like something had attacked his chest and ripped a piece of him out.
He couldn't make out his surroundings. His head felt like he was in a fog, though he was dimly aware of someone touching his face. He tried to make out who it was, to tell them to leave him be, but his mouth was dry, and his throat was sore.
But dawn came at long last, and his breathing came easier. The effect was not immediate, but he felt his body cool and his strength return. He sat up and blinked rapidly, clearing the haze from his eyes.
"It seems you are returned to health."
He glanced over at Kaede, who sat at his right side. He noticed with some guilt that she had bags under her eyes, but he snorted and stood without voicing it.
"Chi, that poison is nothing to a demon."
Kaede shook her head and rose, wishing to return to her own home and sleep for a few more hours. Tending to the hanyou had been exhausting.
"I shall take my leave then, as you appear to have recovered."
Inuyasha did not thank her, but nodded his head and even opened the door for her. It was as much gratitude as he ever showed.
Kaede went on her way without another word, though there were many things she wished to say.
She wished she could tell him he was so much stronger than the hanyou who'd attacked her village five decades ago. She wished to apologize for not seeing the depth of his pain, and for assuming that after a year he'd come to accept Kagome's departure. She wished she could tell him that he didn't need to hide his pain inside until it burst, that she would be there to listen if he ever wanted to talk.
However, Kaede knew Inuyasha well, and knew he would only take offense at such offers. He would be ashamed that she had seen him weep, which was why she had clean his face of tears before he awoke.
And so, Kaede went back down to her small house, and Inuyasha dashed off into the woods. Inuyasha never fully remembered what he'd said and done during that night, and Kaede never spoke of the incident to anyone for two years, until she told Kagome in confidence just how harshly her absence had been felt. |
global_01_local_0_shard_00000017_processed.jsonl/36151 | bookspacePhoto of readerbook club kits
home > bookspace > book club kits
No. 1 Ladies' Detective Agency LARGE PRINT
by McCall Smith, Alexander
Print this list Print this page
Email this list
1. Family life and African culture are very important to Mma Ramotswe. How do her descriptions and discussions of these areas provide insight into her character?
2. When Mma Ramotswe decides to become a detective, she purchases a manual to help her learn the business. The manual advises her to rely on hunches to solve her cases. How does this advice shape "The No. 1 Ladies Detective Agency"?
3. Many contemporary mystery and detective novels have a detective solving one major crime, usually a murder. How is "The No. 1 Ladies Detective Agency" different from other mysteries you've read?
4. Early in her life Mma Ramotswe marries Note and the marriage ends badly. How does this experience impact her job as a detective? Does it give her insight into how others act and what might motivate them?
5. "The No. 1 Ladies Detective Agency" features Mma Ramotswe, a female detective from Botswana. How does the author, whose life is very different from that of Mma Ramotswe's, capture her character?
6. "The No. 1 Ladies Detective Agency" includes many detailed descriptions of African life, and especially features life in Mma Ramotswe's beloved Botswana. Were you familiar with what life might be like in Botswana before you read this novel?
7. Were you surprised by Mma Ramotswe's response to Mr. J L B Maketoni's proposal?
Additional discussion questions from: Reading Group Guides
hcl mobile app
Facebook Twitter Tumblr YouTube Vimeo Flickr Federal Depository Library Federal
Hennepin County Government Hennepin |
global_01_local_0_shard_00000017_processed.jsonl/36234 | Take the 2-minute tour ×
Having trouble with this line on this tutorial:
I just cannot find this area, any idea where i should install it from?
share|improve this question
add comment
1 Answer
up vote 0 down vote accepted
On XDA, in the user profile of Astarioth, there's a link mentioned in the "most thanked" tab: https://dl.dropbox.com/s/vprplelu9zx7s2o/kindle_fire_usb_driver.rar?dl=1 (and this is the XDA post thanked for). The name of the .rar archive suggests it holds your wanted drivers -- and the quote
[...] uninstall your old Kindle USB Driver and install this one.
confirms my guess :)
Now, why didn't you find it in your SDK directory, you might ask? Guess that's as it goes with apples and peaches. You assumed Google's Android SDK -- while Amazon has its own Android SDK. And that line most likely referred to the latter, while you have the former installed. Also only a guess -- but I'd say I guessed right again? You might want to read Setting Up Your Development Environment, take a special look at the section Installing SDK Add-Ons. If you work with Eclipse, this gives you another source to get to the Kindle drivers.
share|improve this answer
All i want is google play store :( thank you for your help. – jackdh Apr 27 '13 at 21:32
Then you should not have bought a Kindle. Though running Android, they are competing Google. But that doesn't help you now -- what might help you is taking a look at How can I install the Google Apps Package (Play Store, …) on my Android device?. I guess, rooting will always be the first step for that... – Izzy Apr 27 '13 at 22:36
Okay thanks, I never bought it haha, Just a gift I am trying to make the most out of. – jackdh Apr 27 '13 at 22:45
Oh -- OK, in that case my apologies for the accusation #D Have you checked the other questions related to rooting the Kindle Fire HD? They might provide additional help. – Izzy Apr 27 '13 at 22:56
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36239 | (navigation image)
Search: Advanced Search
Anonymous User (login or join us)
View movie
item imageitem imageitem imageitem image
View thumbnails
Run time: 59 minutes 16 seconds
Play / Download (help[help])
(250.4 M)512Kb MPEG4
(253.7 M)Ogg Video
(458.6 M)MPEG4
All Files: HTTPS
Shower of Stars - Lend an Ear (October/28/1954)
something has gone horribly wrong 8-p
Prefer flash? · Embed · Questions/Feedback?
Shower of Stars: Lend an ear
Hosted by William Lundigan with Bergen/McCarthy, Gene Nelson, Sheree North and Mario Lanza.
Aired "live" and in color on Oct. 28, 1954.
Like it's the case with most early color broadcasts, it seems that only a b/w kinescope survives.
This movie is part of the collection: Classic TV
Audio/Visual: sound, color
Keywords: Shower of Stars; Classic TV; Live TV; Kinescope; CBS; 1950's Television; 1954; Chrysler; Plymouth
Individual Files
Movie Files MPEG4 Ogg Video 512Kb MPEG4
S_o_S_Lend_an_ear_10_28_1954.mp4 458.6 MB
253.7 MB
250.4 MB
Image Files Animated GIF Thumbnail
S_o_S_Lend_an_ear_10_28_1954.mp4 336.2 KB
2.9 KB
Information FormatSize
ShowerOfStars-LendAnEaroctober281954_files.xml Metadata [file]
ShowerOfStars-LendAnEaroctober281954_meta.xml Metadata 1.1 KB
ShowerOfStars-LendAnEaroctober281954_reviews.xml Metadata 492.0 B
Write a review
Downloaded 1,258 times
Subject: Wow!
After watching this...I think I need a "shower!"
Terms of Use (10 Mar 2001) |
global_01_local_0_shard_00000017_processed.jsonl/36259 | Take the 2-minute tour ×
Possible Duplicate:
Should I trust these packages and ppas on Oneiric Amd64? PPA:
Packages from ppa above:
Jupiter gnome-shell-extensions calendar-indicator oracle-java7-installer indicator-weather lo-menubar xscreensaver xscreensaver-gl-extra xscreensaver-data-extra gimp gimp-plugin-registry gimp-resynthesizer
share|improve this question
add comment
marked as duplicate by Jorge Castro, jokerdino, jrg May 29 '12 at 15:22
2 Answers
up vote 4 down vote accepted
These PPA's you have mentioned are maintained by
• Webupd8
• Ubuntu-x-swat
• atareao
Webupd8 is quite a trusted site. They provide proper well made stable packages. Many people (Even me!) use their PPA's. You should not have a problem with their packages. See their home page
Ubuntu-x-swat is also a great team. Here also many people use it (Me also, again!). You can safely use it but do not forget to read the instructions here
atareao : I have never used their PPA but searching around on the net gives a hint that they are a bit trusted and also recommended by some sites.
Generally most PPA's you find should be stable with no "evil" in them. Just to be sure keep a point in mind to add a PPA only if some sites recommend them. Also make sure to add only stable version of a PPA. Some PPA's provide development versions which might thrash your PC if they are buggy. So in the end the choice is yours.
share|improve this answer
add comment
Its upto you whether you are going to trust any of the untrusted PPA's. I mean to say the risk level depends on youselves.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/36260 | Take the 2-minute tour ×
In my Ubuntu 11.10, I am using MTS USB modem for an Internet connection and have created a Wi-Fi hotspot for accessing the Internet on my Android mobile.
I have successfully created a hotspot and a connection is also established but my mobile does not detect my Wi-Fi hotspot.
Please see my HotSpot Connection Details:
SSID is : myhotspot
Mode : Ad-hoc
Band : Automatic
In IP4 Setting tab:
Method : Shared to other computers.
In Wireless Security Tab:
Security : WPA & WPA2 personal
password : ........
My question is, how do I make my Wi-Fi hotspot accessible with my Android mobile?
Is there any mistake in creating my Wi-Fi hotspot?
share|improve this question
Whats your Android version? – André Stannek Oct 16 '12 at 19:33
add comment
1 Answer
At last till Android 4 it is not possible to connect to Ad-Hoc wifi. The wifi network you open must run in master mode. Unfortunately only a few wifi adapters support master mode. Most consumer products don't. Take a look at this tutorial to find out if yours supports master mode and how to set it up.
share|improve this answer
thanks for your comment – murali Oct 17 '12 at 17:50
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36261 | Take the 2-minute tour ×
I am wanting to fix a typo in a package description, however I don't know how to access this information. I can see it using the apt-cache show command, but where does the package manager actually get this info? I have scoured the source thinking it might pick it up from a config, or man but no dice.
Any ideas?
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
The package description is taken from the file debian/control in the source package, which contains various metadata about the package including name, version and description. For example, if you wanted to access the description for the coreutils package, you could do:
$ apt-get source coreutils
to download the source package into the current directory (and unpack it), then:
$ vi coreutils-8.5/debian/control
to view and edit the package control file.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36295 | Updated NCAA Bracket Projections
Sign Up for B/R Bracket Challenge
David Ortiz Just Won't Let the Steroids Thing Die
Use your ← → (arrow) keys to browse more stories
David Ortiz Just Won't Let the Steroids Thing Die
(Photo by Chris McGrath/Getty Images)
Note: Before beginning this piece, you may want to recap my last on this issue, which can be found here. It's not entirely necessary, as I will be rehashing the key points, but it can't hurt.
David Ortiz's name has appeared on the infamous 2003 list of players who tested positive for performance-enhancing drugs. This, we know, is a fact. While the MLBPA may be disputing the results of some of these tests, the fact remains that this is a list of steroid users, and Ortiz's name is on it.
Is it possible Ortiz's test was a false positive? Well, anything is possible. But the overwhelming likelihood is that Ortiz did use PEDs, as even the MLBPA can't deny that nearly all the test results were indeed correct.
But I'm not here to speculate about the truth behind these tests. I'm here to discuss Ortiz's actions since his name was revealed.
Ortiz refused to deny or confirm the report at first. If he did, in fact, use steroids, this would prove to be a good move, as he would be able to recollect his thoughts and seek advice on the matter. Of course, had he never used, he probably should have denied the story.
Instead, Ortiz took a week before denying the story outright. And when he did, he had help at his side. Michael Wiener, MLBPA union chief sat next to him and conjured up some excuses for the maligned slugger.
Despite what Ortiz may have said, the signs all pointed at the result having been correct: Ortiz did not deny the report outright until he weighed his options, and proved this by showing that he'd discussed the matter with Wiener during the interim.
In addition, Wiener's statements do not exonerate Ortiz at all: they merely open a window for the possibility of his exoneration. But unless Ortiz is among the scant number of false positives (which is extremely unlikely), Ortiz still took steroids, and it's been documented.
But Ortiz continues to deny the story outright, and people seem to be buying it. I don't understand it, but that was what the previous post (linked above) was about, and I won't discuss that now.
However, Ortiz recently made some comments in The Providence Journal about the situation, and by doing so, he kept the story alive. The scandal had blown over for the most part, and people had moved on, but Ortiz for some reason, decided to bring it back up.
Like Roger Clemens, he won't shut up, and in doing so, he only opens himself up to further incrimination. He sounds awfully defensive, and that's not a good sign for him.
Allow me to dissect Ortiz's latest comments:
“You know what kills me? If I know you and, let’s say something happened with you in the past, and I’ve known you for seven years and you’ve been totally normal, I don’t care what happened in the past. I would judge you for what I know."
Okay, so right off the bat, Ortiz is saying "Even if I did do it, why are you judging me now?" That's not a very strong denial, Mr. Ortiz. It sounds like you want a little love because you weren't busted in any of the years AFTER 2003.
“These past few weeks have been terrible for me. People want to [mess] up your reputation and it’s all about the money...that’s what it seems like."
The what?! The money?! I'm sorry, but did anyone mention money before? What money is he talking about?
"People always want you to be a role model. People always want you to be a good guy, but at the end of the day nobody gives an [expletive] about you. You know why? Because when this [expletive] came out, this news, no one...I’m talking about no one in general...stood up and said, ‘Let’s wait to see what David Ortiz has to say. He’s a guy who has been tested 18 times, and why would you believe any of this [expletive],’ or, ‘He’s a guy who has been playing the game clean and let’s wait to hear what he has to say.’"
Is he serious? He got the MLBPA to come to a press conference for him! Alex Rodriguez didn't get any of that support. Instead, everyone jumped all over him, lambasting him as a cheater. Why do you think you'd be any different?
Instead, he actually GOT the help he wanted (and the help that A-Rod equally deserved but didn't get), and now he's complaining about it? What does he want here?
"No. It was, ‘I’m not surprised he got caught. He did this, or he did that.’ David Ortiz has never been involved in any kind of trouble. So why do I have to be the bad guy? Why can’t anyone stand up for David Ortiz?”
Two words: Michael Wiener. That's who's standing up for David Ortiz. While A-Rod stood up and took the heat, you went and whined to your buddy and got your support. Stop complaining.
But let's hop back a sentence. Ortiz wants to know why no one was surprised. Well, here's why: Ortiz benefited from a significant spike in stats and stature the very same year he allegedly tested positive. It's not surprising that his name would appear on the list. That's why no one was surprised!
“People don’t always make money with good things. They make money with bad things."
Again with the money. Where is this coming from?
“Basically that’s what people worry about. So when I hear people talking about, ‘This guy is horrible and sets a bad example. He’s not a role model,’ from now on I’m not going to pay attention to that [expletive] anymore because, seriously, people don’t give a [expletive]. People don’t make money with that.”
I really don't know what he's talking about. The sentences are incoherent, and he's obsessing about money. He's sounding increasingly flustered, and one continues to wonder why he had to make these comments at all. Hasn't he said this already? Let it be!
“It’s all about the money."
Enough already!
"All these [media members] I’ve been dealing with through the years, guys who have come to me and tell me, ‘You’ve made the difference in this clubhouse because you might be the only superstar here who makes our life easy. When we want to talk to you, we can talk to you. You’re a nice guy and you do nice things.’ All that [expletive] went in the garbage when this [expletive] came out. That hurt, bro.”
Are you serious? The media isn't being friendly to you? Have you actually READ any of the articles about this situation, glorifying your nonsensical press conferences, and trying to salvage your image? You know, like THIS VERY ARTICLE?!
“My teammates were there at my press conference, and they all came and hugged [me]. They said, ‘Hey, you’re right.’ The good things nobody talks about, and that’s what kills me. Nobody talks about the good things. All they want to do is put the fans against you and that’s bad, man.”
Shut up. Seriously, shut up. You cry about how you have no support, but then point out how good your teammates have been to you. You talk about how no one cares about the good you've done, when that is a blatant lie.
Everyone is trying to fix this, to make Ortiz come out okay, and he doesn't even acknowledge that. They're trying to save him because they believe he's a good guy, and they don't want his reputation tarnished. But Ortiz won't hear any of that. To him, he's always been a victim. Nobody loves him.
Really, Ortiz, wake up and read a newspaper. Go online and see how many articles have been written about Roger Clemens and Alex Rodriguez, and see how many have been written about you. You're a whiner and it will only make you look bad.
“They’re calling you names and [crap]. You go to New York, you go to Baltimore, you go to all the other cities and you bring your family, your kids. Your son hears people calling you [names]. It’s my family...my kids. With all the good things I’ve done, what’s up with that? All the good I’ve done and all the good things I will get done...what’s up with that? Somebody screwed up and somebody wanted to put money in their pocket and somebody talking [crap], is that fair? I don’t care anymore.”
Well, they're obviously going to call you names in New York. They always have. And you keep bringing up the good you've done, as it that's supposed to exonerate you.
If you've used steroids, you've used steroids, no matter how much good you've done. It doesn't change things.
Still, because he's been good, people are trying to say exactly what Ortiz is saying, which is "the steroids thing doesn't matter." I'm not sure where this came from, but it's there, yet Ortiz doesn't believe it. Oh, and need I point out that he again mentioned money?
Here's what I've taken from these comments:
1- Ortiz believes no one is sticking up for him. He's crying and whining about this, despite the fact that he's received a lot more support than any other offender thus far. It makes him look like a big baby.
2- Ortiz believes that he's been a good guy, so he should be exonerated from any steroid use. I don't know what the correlation here is.
3- Ortiz keeps mentioning money for some reason. I don't know why, and he never explained its relevance to the topic at hand.
In addition, Ortiz's sentences are often incoherent, and don't lead anywhere. It's very difficult to make out what he's saying. It sounds like he's getting increasingly flustered, and that makes him more defensive. Of course, that only makes him appear more guilty, but that's beside the point.
Finally, Ortiz really should keep his mouth shut. Instead, he's rehashing the story he's trying to avoid. It's really bad strategy. Maybe he should speak to his buddy, Michael Wiener, for more advice on how to conduct himself in public.
Look, I don't mind that he took steroids. Everyone is doing it. What bothers me is that he's such a hypocrite, promoting a zero-tolerance policy before being busted for using.
It bothers me that he's so blatantly guilty, but everyone is looking the other way because he's David Ortiz. So many other users aren't getting the same treatment.
And it bothers me that despite this, he believes he's being cornered, and that no one is helping him. It's a guilty complex, and it only makes him look worse.
Ortiz really should keep his mouth shut before the Clemens comparisons start coming in droves. Clemens' reputation has reached rock bottom, and if Ortiz keeps this up, he'll be right there with him.
Load More Stories
Follow B/R on Facebook
Subscribe Now
We will never share your email address
Thanks for signing up. |
global_01_local_0_shard_00000017_processed.jsonl/36331 | Adoption resources shared by our guests, listeners
On today’s Friday Roundtable, we invited adult adoptees on the show to share their experiences. Our guests and listeners mentioned a number of resources and links we wanted to share with listeners. Feel free to contribute additional resources in the comments.
JaeRan’s links:
Permanency and Adoption Competency Certificate
Harlow’s Monkey
The report by the Evan B. Donaldson Adoption Institute, Beyond Culture Camps
Kim Park Nelson’s links:
PBS Point of View
American Radio Works
US Korea Institute
Kelly’s book
From everyone:
Land of Gazillion Adoptees
Also Known As (AKA)
Korean Quarterly
Truth and Reconciliation for the Adoption Community of Korea (TRACK) in Seoul
Language of Blood
Lena Wood
Korean Adoptees of Hawai’i (KAHI)
International Korean Adoptee Services
KoRoot (Korean Guesthouse)
Jerome Foundation
Adopted Territory: Transnational Korean Adoptees and the Politics of Belonging
Adopted Korean Connection
–Meggan Ellingboe, assistant producer |
global_01_local_0_shard_00000017_processed.jsonl/36332 | David Ferguson
Axapta, C++ and Snowboarding
• David Ferguson
Enable Debug on Server
When single stepping through X++ code on the client you can bump into code that can only execute on the server. In a default deployment you will not be able to single step through the code. To enable this feature you must turn it on in the ‘Microsoft...
• David Ferguson
Command Line To Import Data
In Axapta 4.0 you can use the -startupcmd=autorun_ command line option to batch import data is two steps. 1. Create an xml file ( demoData.xml for example) that looks like this: <?xml version="1.0" encoding="utf-8" ?> <AxaptaAutoRun...
Page 1 of 1 (2 items) |
global_01_local_0_shard_00000017_processed.jsonl/36335 | Update 4/26/11: This post has been updated to include additional steps to ensure Kerberos authentication can be used for OAB downloads by domain-connected Outlook clients.
With Exchange 2010, a major change was instituted in the way clients connect and access mailbox related data. Unlike previous versions, clients no longer connect directly to the Information Store on the Mailbox server role to access mailbox data. Instead, clients connect to a set of services on the Client Access server (CAS) role and services within the CAS role access mailbox data using MAPI/RPC from the Mailbox server on behalf of the connecting user.
This architectural change provides many benefits, including:
• A common code path for different client types for message body content conversion.
• Data validation logic. For example, calendar versioning which is used by the Mailbox Assistant, the Calendar Repair Assistant.
• Compliance features like Single Item Recovery or Legal Hold.
• Better client experience during switchovers/failovers by obfuscating the Mailbox server hosting the active mailbox database copy.
• A unified interface for Address Book-related data.
To facilitate high availability and fault tolerance, customers must deploy multiple Client Access servers within the Active Directory sites that host Mailbox servers. To achieve high availability and fault tolerance, you must deploy one or more unified namespaces that are mapped to a virtual IP address of a load balancer. The load balancer must be configured to accept requests over specific TCP ports and provide persistence, where required, for the client protocol being used.
Kerberos Authentication Explained
Typically, domain-joined clients/applications either leverage NTLM or Kerberos for authentication. Other clients, like web browsers, can also use Basic authentication secured with SSL encryption, regardless of the client’s location (inside or outside of the corporate network). The actual authentication mechanism used depends on the configuration of both the client and the server and they negotiate the authentication to be used during the establishment of the connection. MAPI supports Kerberos authentication and the default setting in Outlook 2007 and later is to negotiate the strongest authentication available when not running in Outlook Anywhere mode.
In Exchange 2010, MAPI clients connect to load-balanced array of servers, and not an individual server with its own unique network identity. This change in the messaging architecture presents a challenge, however. In previous Exchange versions, clients connected directly to the Mailbox server which was a single identity on the network. This meant that the client, if capable, could utilize Kerberos authentication for establishing the session with the Mailbox server.
To understand the legacy behavior and how this is a challenge in Exchange 2010 let’s review Kerberos authentication, as documented in How the Kerberos Version 5 Authentication Protocol Works:
1. The client contacts the Key Distribution Center's authentication service for a short-lived ticket (a message containing the client's identity and —for Windows clients –SIDs) called a ticket-granting ticket (TGT).
2. The authentication service (AS) constructs the TGT and creates a session key the client can use to encrypt communication with the ticket-granting service (TGS). The TGT has a limited lifetime. At the point that the client has received the TGT, the client has not been granted access to any resources, even to resources on the local computer.
3. The client wants access to local and network resources. To gain access, the client sends a request to the TGS for a ticket for the local computer or some network server or service. This ticket is referred to as the service ticket. To get the ticket, the client presents the TGT, an authenticator, and the name of the target server (the Service Principal Name or SPN).
Important: SPNs are unique identifiers for services running on servers. Every service that uses Kerberos authentication needs to have a SPN set for it so that clients can identify the service on the network. If a SPN is not set for a service, then clients will have no way of locating that service. Without properly set SPNs, Kerberos authentication is not possible. Additionally, in Windows Server 2003, KDCs will not issue a service ticket for an account that does not have a SPN.
4. The TGS examines the TGT and the authenticator. If these are acceptable, the TGS creates a service ticket. The client's identity is taken from the TGT and copied to the service ticket. Then the ticket is sent to the client.
5. After the client has the service ticket, the client sends the ticket and a new authenticator to the target server, requesting access. The server will decrypt the ticket, validate the authenticator, and for Windows services, create an access token for the user based on the SIDs in the ticket.
6. Optionally, the client might request that the target server verify its own identity. This is called mutual authentication. If mutual authentication is requested, the target server will take the client computer's timestamp from the authenticator, encrypt it with the session key the TGS provided for client-target server messages, and send it to the client.
With Exchange 2003 and Exchange 2007, each Mailbox server would have the following SPNs created and assigned to the Mailbox server’s computer account in Active Directory:
• exchangeMDB/<Mailbox server FQDN>
• exchangeRFR/<Mailbox server FQDN>
• exchangeAB/<Mailbox server FQDN>
These three SPNs enabled a client that was configured with either Negotiate or Kerberos authentication to successfully obtain a service ticket from the TGS. In turn, the Mailbox server could decrypt the service ticket and create an access token and provide access to the mailbox data.
Exchange 2010, however, leverages a load-balanced namespace for accessing mailbox data. The FQDN that a client uses to connect to Exchange resolves to a group of load-balanced Client Access servers. Given that an SPN can only be registered to one unique entity within the Active Directory environment, this means:
1. During CAS install, Exchange Setup cannot create load-balanced namespace SPNs for the address book, referral and RPC Client Access SPN records.
2. Administrators cannot manually register the same load-balanced namespace SPNs on each CAS computer account.
To understand this problem and why either of the above items would not work, let’s assume the Outlook profile is configured to use the load-balanced namespace outlook.contoso.com for its home server property and it is connecting to the CAS member cas1.contoso.com:
1. Client contacts KDC and obtains a TGT.
4. cas1.contoso.com fails to decrypt the service ticket because:
1. Its name does not match outlook.contoso.com.
5. Client fails to obtain an access token using Kerberos authentication.
As a result, when a mailbox is moved to Exchange 2010, Outlook and other MAPI clients that are configured to use Negotiate will ultimately end up using NTLM authentication.
NTLM Authentication Concerns
Why is using NTLM authentication for Outlook and other MAPI clients a concern? Let’s take a look at the authentication process:
1. The user launches Outlook.
2. The user’s computer sends traffic to the server (load-balanced namespace) specified in the Outlook profile. This traffic includes the user’s integrated authentication information (in other words, NTLM authentication).
3. The load balancer directs the traffic to a specific CAS member within the load-balanced array.
4. The CAS member needs to verify the user’s credentials. It does this by sending traffic to a specific domain controller, the one which it has an associated secure channel binding, requesting a verification of the user's credentials.
5. The domain controller responds to the CAS member with the information on the user’s credentials.
6. The CAS member generates an access token and services the request.
The problem here is that each connection from the client must follow this same process. Therefore, as the number of connections increase, there is potential for a bottleneck in terms of handling the NTLM authentication. The bottleneck is a result of the following two issues:
1. The CAS member only uses a single domain controller for all authentication requests. In addition, there is no load distribution mechanism across the CAS members in the load balanced array to ensure that each CAS is using a different domain controller for its secure channel binding.
2. Windows limits the number of concurrent secure channel calls. There are a specific number of threads that can handle NTLM authentication (controlled by MaxConcurrentAPI value, with default equaling 2).
Each MaxConcurrentAPI thread can only deal with one authentication request at a time. However, attributes like network latency, the number of hops the authentication requests have to go through, and the volume of requests can introduce a bottleneck in the authentication process, resulting in some of these transactions waiting longer than a remote client can tolerate. If you have a heavy load, you are more than likely going to hit that limit when these clients authenticate via NTLM. You can monitor for NTLM failure events using the Netlogon performance counters (see KB 928576), as well as, the frequency of event ID 5783.
Windows Server does have a means to increase the number of concurrent secure channel calls up to 150 when you deploy KB 975363. However, increasing the number of concurrent secure channel calls up as far as 150 is also not recommended, as it can have adverse effects on domain controller performance.
The Recommendation
If increasing the number of concurrent secure channel calls is not the answer, then what is? Prior to Exchange 2010 SP1, unfortunately there was no answer. Thankfully in Exchange 2010 SP1, we introduced a solution. The solution involves leveraging an alternate service account (ASA) credential mechanism to enable Kerberos authentication for MAPI clients.
The Microsoft Exchange Service Host service that runs on CAS has been extended to use a shared credential for Kerberos authentication. This service host extension monitors the local machine. When credentials are added or removed, the Kerberos authentication package on the local system and the network service context is updated. As soon as a credential is added to the authentication package, all client access services can use it for Kerberos authentication. The Client Access server will also be able to authenticate service requests addressed directly in addition to being able to use the ASA credential. This extension, known as a servicelet, runs by default and requires no configuration or action to run.
The steps to deploy the ASA credential are as follows:
1. Create an account to be used as the ASA credential.
2. Deploy the ASA credential to the CAS members.
3. Convert the OAB virtual directory to an application.
4. Assign the SPNs to the ASA credential computer account.
Create an account to be used as the ASA credential
All computers within the Client Access server array must share the same service account. In addition, any Client Access servers that may be activated as part of a datacenter switchover must also share the same service account. In general, it's sufficient to have a single service account per forest.
You can create a computer account or a user account for the alternate service account. Because a computer account doesn’t allow interactive logon, it may have simpler security policies than a user account and is therefore the preferred solution for the ASA credential. If you create a computer account, the password doesn't actually expire, but we still recommend that you update the password periodically. The local group policy can specify a maximum account age for computer accounts and scripts may be scheduled to periodically delete computer accounts that don’t meet current policies. To ensure that your computer accounts aren't deleted for not meeting local policy, update the password for computer accounts periodically. Your local security policy will determine when the password must be changed.
Deploy the ASA credential to the CAS members
To enable deployment of the ASA credential, a script has been created and is shipped with Exchange 2010 SP1. The script is named RollAlternateServiceAccountPassword.ps1 and is located in the Scripts directory. For more information on how to use the script, please see Using the RollAlternateserviceAccountPassword.ps1 Script in the Shell.
Convert the OAB virtual directory to an application
Out of the box, the OAB virtual directory is not a web application and, therefore, is not under the control of the Microsoft Exchange Service Host service. As a result, Kerberos authentication requests to the OAB virtual directory cannot be decrypted by the ASA credential.
To convert the OAB virtual directory to a web application, execute the ConvertOABVDir.ps1 script on each CAS member. The script will also create a new application pool for the OAB virtual directory. You can download the script here.
Assign the SPNs to the ASA credential computer account
After you create the alternate service account, you must determine the Exchange service principal names (SPNs) that will be associated with the ASA credentials. The list of Exchange SPNs may vary with your configuration, but should include at least the following.
• http Use this SPN for Exchange Web Services, Offline Address Book downloads, and the Autodiscover service.
• exchangeMDB Use this SPN for RPC Client Access service.
• exchangeRFR Use this SPN for the Address Book service.
• exchangeAB Use this SPN for the Address Book service.
The SPN values must be configured to match the service name being used on the load balancer, rather than on individual servers.
For example, if you have a single Active Directory site, your environment may resemble the one in the following illustration.
Based on the fully qualified domain names that are used by internal Outlook clients in the previous illustration, the following SPNs would need to be deployed on the ASA credential:
• http/mail.corp.contoso.com
• http/autod.corp.contoso.com
• exchangeMDB/outlook.corp.contoso.com
• exchangeRFR/outlook.corp.contoso.com
• exchangeAB/outlook.corp.contoso.com
External or Internet-based clients that use Outlook Anywhere won’t use Kerberos authentication as they cannot directly contact a KDC. Therefore, the fully qualified domain names that are used by these clients don’t have to be added as SPNs to the ASA credential.
After you have identified the required SPNs, you can assign them using the SETSPN command line tool.
For more information, including information on how to plan what SPNs you should deploy with your ASA credential, see Configuring Kerberos Authentication for Load-Balanced Client Access Servers.
Due to scalability limits when using NTLM authentication, Microsoft recommends deploying the ASA credential solution so that domain-joined and domain-connected Outlook clients, as well as other MAPI clients, can leverage Kerberos authentication.
Ross Smith IV |
global_01_local_0_shard_00000017_processed.jsonl/36338 | (Quick public dump so I can find the tool link again easily)
1. Download the Windows 7 USB/DVD tool from here. (NB links to the page, not the EXE)
2. Download ISO image from store or MSDN
3. Run Win7 USB DVD Tool and point it to ISO and USB Stick
• Label stick
• Seriously Tristan, label the damn stick
• You know what happens when you don’t.
4. Boot from stick, or run Setup from stick
5. ???
6. Profit!
Works for Windows 8, worked for Windows 8.1 Preview, no reason to think it won’t work for Windows 8.1 RTM, or Windows Server 2012 R2 etc.
Good if you’re planning a clean installation; otherwise, simply double-clicking the ISO is probably enough to do the upgrade as of Windows 8, which can mount ISOs and VHDs from a double-click. |
global_01_local_0_shard_00000017_processed.jsonl/36365 | The Gravity of Sin
Causing the little ones to commit sin is so grave that it merits drowning with a millstone around the neck to make sure that the tempter really perishes in the depths. The evangelist also presents the catechesis of the gravity of sin telling us to cut off the part of our body that causes us to commit sin. It is not that easy since we all know that it is not the part that commits the sin but the person himself or herself. But the Lord emphasizes to us that we can avoid committing sin by doing something. Yes, as the hand is part of the body like the foot and the eye, we can refer to these as necessary means of going against God, yet we as persons are the culprit. Cutting a part of one’s body is painful enough but the pain is rewarded with getting into the kingdom of God. Humanly speaking, this cutting off is difficult but with God’s grace we can do it. It will cause us pain but we will have life with God.
Again the comparison with the salt is presented. What are believers for in this world if we cannot give taste? The challenge of being the one to give taste in our society today is seemingly meaningless. Though our churches are full on Sundays and Lenten days, still the call of the Lord goes in the daily living we make. Are we always aware of this? |
global_01_local_0_shard_00000017_processed.jsonl/36373 | HOME > Chowhound > Japan >
What's your latest food project?
Best vongole pasta in Tokyo?
RipCurl Sep 6, 2013 06:37 PM
'Best' is subjective, but would be great to hear which ones you most enjoyed, be it bianco or rosso (but no cream please!)
Searched the board & saw Charlesyu's rec for (chain restaurant?) La Boheme, any particular location?
1. kamiosaki Sep 9, 2013 01:42 PM
Ebisu? Que? I always thought LB was decent for lunch if you order the omori but yeah it's not in the class of those other places. Uncle Tom had a pasta with seafood at one time me recalls. How about Eataly up the hill in DKY, but always thought that place was a bit overrated. Always Spaghetti Dan in Meguro if you fancy a short walk, he always had 100 different pasta types on the menu. Sorry I went downmarket there. Lanterna Magica?
11 Replies
1. re: kamiosaki
RipCurl Sep 10, 2013 09:59 AM
Am I right in assuming LB = La Brianza & not La Bisboccia? (Ebisu as that's where the latter is located & we can squeeze in tapas w/ less travelling around, not because we have a burning desire to go there otherwise)
ActualIy I was curious about La Brianza principally because (1) their Tabelog entry has a rather nicely taken picture of vongole pasta right up front (2) it was mentioned in a previous post about Japanese Italian restaurants as a place to go. But if it's not as good as the other places (by which you mean the ones that U. Yabai has mentioned, or the ones in your post?) then I might skip that
1. re: RipCurl
killersmile Sep 10, 2013 11:20 AM
My assumption was LB = La Boheme as that is the only one in a different class from the others.
1. re: killersmile
Robb S Sep 10, 2013 11:24 AM
Elio is also in a different class from the others....
1. re: Robb S
Tripeler Sep 10, 2013 08:52 PM
Elio is probably the very nicest Italian restaurant I have ever been to in Tokyo.
1. re: Robb S
Uncle Yabai Sep 10, 2013 09:54 PM
In a good way or in a bad way?
1. re: Uncle Yabai
Tripeler Sep 11, 2013 01:19 AM
I'm not Robb, but I believe Elio is different in a good way.
1. re: Tripeler
Uncle Yabai Sep 11, 2013 03:41 AM
Don't get me wrong, I like Elio, but the fawning OL business model gives me the shpilkes.
1. re: Tripeler
Robb S Sep 11, 2013 05:15 AM
To be fair, the food at Elio is generally pretty decent, it's just outlandishly overpriced considering the choice of great Italian restaurants at a similar or lower price level.
Also the last time I went there I had to sit through the Happy Birthday song being sung at four different tables.
2. re: RipCurl
kamiosaki Sep 10, 2013 03:32 PM
Never went to La Brianza so can't say. And sorry LB = La Boheme.
1. re: kamiosaki
Uncle Yabai Sep 10, 2013 04:33 PM
Who's on first?
1. re: Uncle Yabai
kamiosaki Sep 11, 2013 04:03 AM
all together now: "Third base!"
2. u
Uncle Yabai Sep 8, 2013 08:53 AM
Forget La Boheme. Probably some place like La Bisboccia, or even Elio Locanda.
3 Replies
1. re: Uncle Yabai
RipCurl Sep 9, 2013 07:41 AM
Ha, good to know, thanks v much! Will check out La Bisboccia (probably not Elio Locanda as no vongole according to their website), and likely also La Brianza (perhaps the trattoria, hope that's as good as their main place).
And since we'll be in Ebisu, maybe we can squeeze in some tapas before / after La Bisboccia...
1. re: RipCurl
Uncle Yabai Sep 9, 2013 10:35 AM
La Brianza would be another option. Or Piccolo Grande.
1. re: Uncle Yabai
RipCurl Sep 10, 2013 10:04 AM
Ok got that, will check out Piccolo Grande's details. Which of the three is your personal favourite for pasta?
Btw thanks for responding to a somewhat random-sounding query (relative to the usual posts on the Japan board at any rate).
Show Hidden Posts |
global_01_local_0_shard_00000017_processed.jsonl/36383 | Macro Wb-Map
Part of:
package fset
( wb-map &rest args )
Constructs a wb-map according to the supplied argument subforms. Each
argument subform can be a list of the form (key-expr value-expr), denoting
a mapping from the value of key-expr to the value of value-expr; or a list
of the form ($ expression), in which case the expression must evaluate to a
map, denoting all its mappings. The result is constructed from the denoted
mappings in left-to-right order; so if a given key is supplied by more than
one argument subform, its associated value will be given by the rightmost such |
global_01_local_0_shard_00000017_processed.jsonl/36384 | File:Théâtre de Plaute, Panckoucke, tome 4.djvu
From Wikimedia Commons, the free media repository
Jump to: navigation, search
Go to page
Original file(2,048 × 3,172 pixels, file size: 8.56 MB, MIME type: image/vnd.djvu, 466 pages)
Théâtre de Plaute, tome 4
Source Bibliothèque nationale de France
Author Plaute
File history
current19:07, 5 March 2011Thumbnail for version as of 19:07, 5 March 20112,048 × 3,172, 466 pages (8.56 MB)Phe (talk | contribs)== {{int:filedesc}} == {{Information |Description=Théâtre de Plaute, tome 4 |Source= |Date=1835 |Author=Plaute |Permission= |other_versions= }} <!--{{ImageUpload|basic}}--> == {{int:license}} == {{PD-old}}
• You cannot overwrite this file.
There are no pages that link to this file.
File usage on other wikis
The following other wikis use this file: |
global_01_local_0_shard_00000017_processed.jsonl/36385 | User talk:WJBscribe
From Wikimedia Commons, the free media repository
Jump to: navigation, search
Crystal Clear app lphoto.png
(en · meta)
Face-smile.svg Hi! Please leave a message and I'll get back to you... Face-smile.svg
Don't hesitate to get in touch if you have a question or need help, whether you think I can help you as an administrator or as another contributor of content. I'll do my best and can probably point you in the right direction if it isn't something I can sort out myself. If you want to ask me about an image I've deleted, please remember to link me to the deleted image so I know what we're talking about.
I usually reply to messages here, unless the matter is urgent and I want to make sure you get the reply quickly.
a heads-up[edit]
Cheers Geo Swan (talk) 23:38, 14 May 2013 (UTC) |
global_01_local_0_shard_00000017_processed.jsonl/36391 |
Saints fire Spags
Discussion in 'NFL Zone' started by jblaze2004, Jan 24, 2013.
1. TheFinisher
TheFinisher Well-Known Member
2,083 Messages
203 Likes Received
He was hired by the Rams.
2. big dog cowboy
big dog cowboy THE BIG DOG Staff Member
46,412 Messages
1,472 Likes Received
The talent level in NO is much lower than what he had in NY. But I'm still surprised they were that bad.
3. supercowboy8
supercowboy8 Well-Known Member
4,997 Messages
210 Likes Received
Other teams are actually moving to the 4-3 too. Both styles work just depends on the players.
4. Risen Star
Risen Star Likes Collector Zone Supporter
18,504 Messages
3,475 Likes Received
I hate the switch.
Only the Cowboys would switch to a 3-4, never get a nose tackle for the scheme and then switch back.
5. hsfolk
hsfolk Member
355 Messages
20 Likes Received
ESPN's Adam Schefter reports that the Saints will consider adding Eric Mangini and Romeo Crennel to their 2013 defensive staff.
Schefter suggests Crennel and Mangini "could go together" to New Orleans, with one serving as defensive coordinator. Crennel and Mangini have familiar backgrounds as Bill Parcells and Bill Belichick disciples, respectively. They were both on staff when Belichick's Patriots won three Super Bowls.
6. hsfolk
hsfolk Member
355 Messages
20 Likes Received
The New Orleans Times-Picayune names Martez Wilson and Junior Galette as two defenders likeliest to benefit from the Saints' move to a 3-4.
Wilson, a linebacker at Illinois, flashed with three sacks as a nickel pass rusher in 2012 and at 6-foot-4, 252, is built like a 3-4 outside linebacker. Galette, who goes 6-foot-2, 258, racked up five sacks in a rotational role. It's conceivable that Galette and Wilson could open the 2013 season as New Orleans' bookend outside rushers with Cam Jordan and Akiem Hicks on the ends
7. Teague31
Teague31 Defender of the Star
6,044 Messages
203 Likes Received
The move to the 3-4 certainly affects my draft plans as the saints GM I'm the upcoming mock.
8. CowboysFanSince88
CowboysFanSince88 Well-Known Member
4,022 Messages
63 Likes Received
So I guess is not that Defensive Specialist everyone thought he was:laugh2:
9. hsfolk
hsfolk Member
355 Messages
20 Likes Received
give Saints John Jenkins if he's on board. I hope they don't forget a 3-4 needs a great NT
10. CowboysFanSince88
CowboysFanSince88 Well-Known Member
4,022 Messages
63 Likes Received
Spags will get another job because the NFL is a "recycle league"
11. Seven
Seven Messenger to the football Gods
10,788 Messages
219 Likes Received
12. InmanRoshi
InmanRoshi Zone Scribe
18,334 Messages
79 Likes Received
If they're bringing in Crennel they'll have to drastically add size to their DL. He's about the two-gappiest two gapper that ever two gapped.
13. joseephuss
joseephuss Well-Known Member
19,553 Messages
435 Likes Received
The Saints just have a bad defense. They were going downhill with Gregg Williams the year before. They struggle to stop the Lions and the 49ers in last years playoffs and just continued that horrible trend this entire season.
14. hsfolk
hsfolk Member
355 Messages
20 Likes Received
Cameron Jordan should thrive better in the 3-4
Share This Page |
global_01_local_0_shard_00000017_processed.jsonl/36392 | Net-Snarl INSTALLATION To install this module, run the following commands: perl Makefile.PL make make test make install SUPPORT AND DOCUMENTATION After installing, you can find documentation for this module with the perldoc command. perldoc Net::Snarl You can also look for information at: RT, CPAN's request tracker AnnoCPAN, Annotated CPAN documentation CPAN Ratings Search CPAN LICENSE AND COPYRIGHT Copyright (C) 2010 Alan Berndt This program is free software; you can redistribute it and/or modify it under the terms of either: the GNU General Public License as published by the Free Software Foundation; or the Artistic License. See for more information. |
global_01_local_0_shard_00000017_processed.jsonl/36393 | package Catalyst::View; use Moose; extends qw/Catalyst::Component/; =head1 NAME Catalyst::View - Catalyst View base class =head1 SYNOPSIS package Catalyst::View::Homebrew; use base qw/Catalyst::View/; sub process { # template processing goes here. } =head1 DESCRIPTION This is the Catalyst View base class. It's meant to be used as a base class by Catalyst views. As a convention, views are expected to read template names from $c->stash->{template}, and put the output into $c->res->body. Some views default to render a template named after the dispatched action's private name. (See L.) =head1 METHODS Implements the same methods as other Catalyst components, see L =head2 process gives an error message about direct use. =cut sub process { Catalyst::Exception->throw( message => ( ref $_[0] || $_[0] ). " directly inherits from Catalyst::View. You need to\n". " inherit from a subclass like Catalyst::View::TT instead.\n" ); } =head1 AUTHORS Catalyst Contributors, see =head1 COPYRIGHT This library is free software. You can redistribute it and/or modify it under the same terms as Perl itself. =cut no Moose; __PACKAGE__->meta->make_immutable(); 1; |
global_01_local_0_shard_00000017_processed.jsonl/36394 | package Bio::Protease::Role::Specificity::Regex; { $Bio::Protease::Role::Specificity::Regex::VERSION = '1.112980'; } # ABSTRACT: A role that implements a regex-based specificity use Moose::Role; use Bio::Protease::Types 'ProteaseRegex'; has regex => ( is => 'ro', isa => ProteaseRegex, coerce => 1, ); sub _cuts { my ($self, $peptide) = @_; if ( grep { $peptide !~ /$_/ } @{$self->regex} ) { return; } return 'yes, it cuts'; } 1; __END__ =pod =head1 NAME Bio::Protease::Role::Specificity::Regex - A role that implements a regex-based specificity =head1 VERSION version 1.112980 =head1 SYNOPSIS package My::Protease; use Moose; with qw(Bio::ProteaseI Bio::Protease::Role::Specificity::Regex); package main; my $p = My::Protease->new( regex => qr/.{3}AC.{3}/ ); # coerces to [ qr/.../ ]; my @products = $p->digest( 'AAAACCCC' ); # @products: ('AAAA', 'CCCC') =head1 DESCRIPTION This role implements a regexp-based specificity for a class that also consumes the L role. A peptide will be cleaved if any of the regexes provided at construction time matches it. The regexes should be tailored for 8-residue-long peptides, the cleavage site being between the fourth and fifth residues. For instance, if the specificity could be described as "cuts after lysine or arginine", the appropriate regular expression would be C. =head1 ATTRIBUTES =head2 regex A C, which is basically an array reference of regular expressions that describe the protease specificity. It can coerce from a single regular expression into a single-element array of regexps. Any of the regexes in the array should match a given substrate for it to be cleavable. =head1 AUTHOR Bruno Vecchi =head1 COPYRIGHT AND LICENSE This software is copyright (c) 2011 by Bruno Vecchi. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. =cut |
global_01_local_0_shard_00000017_processed.jsonl/36395 | ?RCS: $Id: sitebin.U,v $ ?RCS: ?RCS: Copyright (c) 1999 Andy Dougherty ?RCS: ?RCS: You may redistribute only under the terms of the Artistic Licence, ?RCS: as specified in the README file that comes with the distribution. ?RCS: You may reuse parts of this distribution only within the terms of ?RCS: that same Artistic Licence; a copy of which may be found at the root ?RCS: of the source tree for dist 3.0. ?RCS: ?RCS: $Log: sitebin.U,v $ ?RCS: ?MAKE:sitebin sitebinexp installsitebin : Getfile Oldconfig siteprefix test \ installprefix prefix ?MAKE: -pick add $@ %< ?Y:TOP ?S:sitebin: ?S: This variable holds the name of the directory in which the user wants ?S: to put add-on publicly executable files for the package in question. It ?S: is most often a local directory such as /usr/local/bin. Programs using ?S: this variable must be prepared to deal with ~name substitution. ?S: The standard distribution will put nothing in this directory. ?S: After perl has been installed, users may install their own local ?S: executables in this directory with ?S: MakeMaker Makefile.PL ?S: or equivalent. See INSTALL for details. ?S:. ?S:sitebinexp: ?S: This is the same as the sitebin variable, but is filename expanded at ?S: configuration time, for use in your makefiles. ?S:. ?S:installsitebin: ?S: This variable is usually the same as sitebinexp, unless you are on ?S: a system running AFS, in which case they may differ slightly. You ?S: should always use this variable within your makefiles for portability. ?S:. : determine where add-on public executables go case "$sitebin" in '') dflt=$siteprefix/bin ;; *) dflt=$sitebin ;; esac fn=d~ rp='Pathname where the add-on public executables should be installed?' . ./getfile sitebin="$ans" sitebinexp="$ansexp" : Change installation prefix, if necessary. if $test X"$prefix" != X"$installprefix"; then installsitebin=`echo $sitebinexp | sed "s#^$prefix#$installprefix#"` else installsitebin="$sitebinexp" fi |
global_01_local_0_shard_00000017_processed.jsonl/36404 | Question | Discussion | References | CME Credit
Case 1: High-Risk Behavior Among HIV-infected Individuals
You answered:
C His practice of having casual sex only with partners whom he assumes are HIV-infected reduces his likelihood of acquiring a sexually transmitted disease (STD).
This answer is incorrect. Selecting sex partners who are HIV-infected (serosorting) does not protect this patient against STDs. Indeed, unprotected intercourse with casual or anonymous partners greatly increases his risk of acquiring a STD.
A It is unusual that this individual has remained sexually active despite having HIV infection, since fewer than 20% of HIV-infected men remain sexually active once they have a diagnosis of HIV.
B Although many HIV-infected men, such as this patient, are sexually active, fewer than 5% of them engage in unprotected anal intercourse.
D Medications used to treat erectile dysfunction have been associated with increased unsafe sexual practices in HIV-infected men who have sex with men (MSM).
[Back to Case 1 Question | Go to Correct Answer] |
global_01_local_0_shard_00000017_processed.jsonl/36405 | Discussion Board
Results 1 to 2 of 2
1. #1
Registered User
Join Date
Mar 2003
Nokia 6310i and local Web access via modem
Please, I have Nokia 6310i and notebook with modem (IBM T23). I have simple example with midlet, which is calling some Web page, which return some text. This text is read by midlet and displayed on my phone. If the Web page is general (public) available, everything runs fine (I am using the general connection/service, which is used for WAP). But I want configure the similar connection/service for the Web server (Apache), which is running on my PC (Windows2000 or Linux) and I want access the WWW page, which is running on my PC. I connected the telephone line into notebook modem and set the telephone number, user, password in my mobile. When I run my midlet and connect to web, the modem pick up my call, connect as required user, but the web page is not accessible.
Please, what is correct setting for mobile phone and for the modem ?
Any information (experiences) are very appreciated!
Thank you!
2. #2
Regular Contributor
Join Date
Mar 2003
RE: Nokia 6310i and local Web access via modem
Jan, please try to connect with another device, maybe even a PC over a modem to see if that part of your architecture is working first. There's not all that much to go wrong on your handset side. Except that you MUST have access to a gateway. If you are loading markup langagage you must be fetching WML and not HTML on that handset. If you're going directly to a .jad file (i.e. http://domain/path/filename.jad then you might want to check that the server knows how to handle the MIME type. What happens if you create a small piece of WML on that machine and serve that with a link to your .jad file? Just a suggestion.
again, I can't stress enough to make sure that each piece of your architecture is working independently then interoperating network-wise via your remote access connection.
Mike Lupo
Forum Nokia Developer Support
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts |
global_01_local_0_shard_00000017_processed.jsonl/36413 | Gunter's chain Unabridged
shackles or fetters: to place a prisoner in chains.
bondage; servitude: to live one's life in chains.
a range of mountains.
Chemistry. two or more atoms of the same element, usually carbon, attached as in a chain. Compare ring1 ( def 17 ).
Surveying, Civil Engineering.
a distance-measuring device consisting of a chain of 100 links of equal length, having a total length either of 66 feet (20 meters) (Gunter's chain or surveyor's chain) or of 100 feet (30 meters) (engineer's chain)
a unit of length equal to either of these.
a graduated steel tape used for distance measurements. Abbreviation: ch
Mathematics, totally ordered set.
Football. a chain 10 yards (9 meters) in length for determining whether a first down has been earned.
verb (used with object)
Surveying. to measure (a distance on the ground) with a chain or tape.
Computers. to link (related items, as records in a file or portions of a program) together, especially so that items can be run in sequence.
verb (used without object)
to form or make a chain.
drag the chain, Australian Slang. to lag behind or shirk one's fair share of work.
in the chains, Nautical. standing outboard on the channels or in some similar place to heave the lead to take soundings.
1250–1300; Middle English chayne < Old French chaeine < Latin catēna fetter; see catena
chainless, adjective
chainlike, adjective
interchain, verb (used with object)
unchained, adjective
4. sequence, succession, train, set. Unabridged
Cite This Source Link To Gunter's chain
World English Dictionary
chain (tʃeɪn)
1. a flexible length of metal links, used for confining, connecting, pulling, etc, or in jewellery
2. (usually plural) anything that confines, fetters, or restrains: the chains of poverty
3. (usually plural) Also called: snow chains a set of metal links that fit over the tyre of a motor vehicle to increase traction and reduce skidding on an icy surface
4. a. a number of establishments such as hotels, shops, etc, having the same owner or management
b. (as modifier): a chain store
5. a series of related or connected facts, events, etc
7. See (as an example) sorites (of reasoning) a sequence of arguments each of which takes the conclusion of the preceding as a premise
8. Also called: Gunter's chain a unit of length equal to 22 yards
9. Also called: engineer's chain a unit of length equal to 100 feet
10. chem open chain See also ring two or more atoms or groups bonded together so that the configuration of the resulting molecule, ion, or radical resembles a chain
11. geography a series of natural features, esp approximately parallel mountain ranges
12. informal (Austral), (NZ) off the chain free from responsibility
13. informal jerk someone's chain, yank someone's chain to tease, mislead, or harass someone
vb (often foll by up)
14. surveying to measure with a chain or tape
15. to confine, tie, or make fast with or as if with a chain
16. to sew using chain stitch
[C13: from Old French chaine, ultimately from Latin; see catena]
Chain (tʃeɪn)
Gunter's chain
surveying See chain a measuring chain 22 yards in length, or this length as a unit
[C17: named after Edmund Gunter (1581--1626), English mathematician and astronomer]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
c.1300, from O.Fr. chaeine, from L. catena "chain," from PIE base *kat- "to twist, twine." The verb is attested from late 14c. Chain of stores is Amer.Eng., 1846. Chain letter first recorded 1906.
"In 1896, Miss Audrey Griffin, of Hurstville, New South Wales initiated a 'chain letter' with the object of obtaining 1,000,000 used postage stamps." ["Daily Chronicle," July 27, 1906]
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
chain (chān)
Chain (chān), Ernst Boris. 1906-1979.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
American Heritage
Science Dictionary
chain (chān) Pronunciation Key
The American Heritage® Science Dictionary
Cite This Source
Slang Dictionary
Bible Dictionary
Chain definition
Easton's 1897 Bible Dictionary
Cite This Source
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/36417 | carrying charge
Idioms & Phrases
carrying charge
1. Interest charged on the balance owed when paying on an installment plan, as in What is the carrying charge for this credit card? The term denotes the amount charged for carrying the remaining debt. [Late 1800s]
2. The cost incurred when an asset is unproductive, as when aircraft are grounded during a strike, real estate cannot be developed owing to zoning laws, or similar circumstances. For example, The carrying charge for owning this building may send us into bankruptcy.
The American Heritage® Dictionary of Idioms by Christine Ammer.
Copyright © 1997. Published by Houghton Mifflin.
Cite This Source
Previous Definition: carrying back
Next Definition: carrying forward
Words Near: carrying charge
More from
Synonyms and Antonyms for carrying charge
More from
Search for articles containing carrying charge
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/36421 | Solaris 10 What's New
Communication Protocol Parser Utilities
Session Description Protocol (SDP), RFC 4566, is used for describing multimedia sessions for session announcement, session invitation, and other forms of multimedia session initiation. SDP conveys media details such as type and encoding, transport protocol, session name, purpose, owner, and other session description metadata to the participants.
The libcommputil(3LIB) library provides public interfaces that parses the SDP description and checks for syntax conformance. This library also contains interfaces to generate SDP messages and convert the messages to byte-strings. SDP is used predominantly by the Session Initiation Protocol (SIP). With the libcommputil(3LIB) library, Solaris SIP developers can leverage these interfaces in developing SIP applications on the Solaris platform.
For more information, see the libcommputil(3LIB) man page. |
global_01_local_0_shard_00000017_processed.jsonl/36422 | Trail: Essential Classes
Lesson: Exceptions
Section: How to Throw Exceptions
Creating Exception Classes
Home Page > Essential Classes > Exceptions
Creating Exception Classes
When faced with choosing the type of exception to throw, you can either use one written by someone else — the Java platform provides a lot of exception classes you can use — or you can write one of your own. You should write your own exception classes if you answer yes to any of the following questions; otherwise, you can probably use someone else's.
An Example
Suppose you are writing a linked list class. The class supports the following methods, among others:
The linked list class can throw multiple exceptions, and it would be convenient to be able to catch all exceptions thrown by the linked list with one exception handler. Also, if you plan to distribute your linked list in a package, all related code should be packaged together. Thus, the linked list should provide its own set of exception classes.
The next figure illustrates one possible class hierarchy for the exceptions thrown by the linked list.
A possible class hierarchy for the exceptions thrown by a linked list.
Example exception class hierarchy.
Choosing a Superclass
Any Exception subclass can be used as the parent class of LinkedListException. However, a quick perusal of those subclasses shows that they are inappropriate because they are either too specialized or completely unrelated to LinkedListException. Therefore, the parent class of LinkedListException should be Exception.
Most applets and applications you write will throw objects that are Exceptions. Errors are normally used for serious, hard errors in the system, such as those that prevent the JVM from running.
Note: For readable code, it's good practice to append the string Exception to the names of all classes that inherit (directly or indirectly) from the Exception class.
Complaints? Compliments? Suggestions? Give us your feedback.
Previous page: Chained Exceptions
Next page: Unchecked Exceptions — The Controversy |
global_01_local_0_shard_00000017_processed.jsonl/36428 | January 10, 2007
Americans Confronted With Warm Winters
This article makes me wonder if one of my red sisters is still convinced that global warming is a "liberal conspiracy." She lives near D.C., so she's been affected by this unnaturally warm weather.
One thing I should point out is that climate changes like the ones that have been happening in recent weeks are going to affect the middle latitudes the most. Here on the equator (S'pore is one degree north of the equator), the effects of global warming won't be nearly as severe as they will be, insha'allah, in the US or Europe. Down here, where there's more ocean than land, the heat from the sun turns the water into clouds, helping to block the sun's rays (reflecting the heat back into space). As a result, our climate remains a relatively stable 30-33 degrees Celsius (around 90 degrees Farenheit) every day of the year. Yes, we do have an endless summer, but the temperature isn't oppressive with heat waves and the like as you'll get in the US and Europe. So, if you live further north, expect your summers (and winters) to become much worse than it is down here in the tropics.
A week of warm temperatures in the middle of winter is now making Americans confront terms like climate change and global warming. Last year at this time the Big Apple was snowed in by a blizzard but today New Yorkers are walking around in T-shirts.
And it is the same all along the East Coast. Temperatures soared to record highs on Saturday, touching 70 degrees Fahrenheit in Washington DC, Northern Virginia and Maryland.
"I know very well that it's not supposed to be like this, so what does it mean?" said Karen Bukhart, Boston resident.
Meteorologists answer that El Nino is to blame. "It enhances the jet stream across the pacific and the southern states of the US. This produces a mild pattern for much of the United States," said Vernon Kousky, meteorologist.
But environmentalists warn that while El Nino may have been the immediate cause for the warm weather, there is more to this than just El Nino. "Underneath those reasons relates to global warming. Global warming is setting up conditions that are making it more likely for us to see these kinds of effects.
While it may be inappropriate for us to say that global warming specifically caused this one event it makes it more likely for such events to occur," said Dr Bill Chameides, Chief Scientist, Environmental Defense.
In Washington, the unusually warm weather has caused cherry blossoms to bloom three months early. While the flowers are pleasing to the eye they are also a cause of worry. Americans are increasingly wondering what is going on.
"It really concerns me. It is January 6. We should be in the middle of a snowy period, a cold period. Life and ecosystems need that full cycle to rejuvenate and something is wrong. All of the flowers are blooming, the cherry tree blossoms, the crocuses. I personally attribute this to global warming," said Laura Bowling, a US resident.
The United States, the world's biggest emitter of greenhouse gases, pulled out of the Kyoto treaty in 2001.
But Katrina, the summer's heat wave, last week's snow storms in Denver and now temperatures of over 20 degrees Celsius in January seems to be sending the message home - that climate change is for real.
mo said...
assalam alaikum brother,
nice blog here, got here via google searching for muslim revert videos, you can also find some nice ones at http://www.turntoislam.com
Ann said...
Assalaamu alaikum,
Do you know where I can find predictions of how global warming will affect different parts of the world? I live in Kuwait (where we've actually had a very cold winter with it getting into the 30s Fahrenheit on many nights). I'm wondering if it's supposed to get even more hot here. I also think about the ahadith saying that the Arabian peninsula will become green again, and I wonder if the climate change is predicted to do anything like that.
JDsg said...
Most predictions of global warming's effect on climate change (that I've seen) have dealt with higher ocean levels and the ultimate flooding of low-lying islands, parts of continents, etc. I suspect most people discuss the flooding issue more because it's a short-term effect of global warming (climate change in the way you describe is probably more long-term). I do think, personally, that mid-level latitudes, like where Kuwait is, will have a significantly hotter overall temperatures in the future. Certainly that has been happening in the SW, especially Arizona (where I lived for 20 years). Overall temperatures in Phoenix had risen significantly in the past two decades, although I believe the "heat island" effect (due to Phoenix's growth in population) was also a significant factor there.
Still, yes, I think that we may ultimately see major climate changes that may make deserts become green again and green areas become deserts. If you're familiar with the movie "The English Patient," part of the movie deals with the Ain Doua rock paintings in the Libyan desert. The movie highlights a number of drawn human figures that are shown swimming. (Certainly not the type of art you'd expect in the middle of the Sahara!) And so, about 5400 years ago, the Sahara, which was once covered in grasses and shrubs, ultimately turned into the massive desert we see today.
It could happen, yes. |
global_01_local_0_shard_00000017_processed.jsonl/36435 | Ein Sof
From Wikipedia, the free encyclopedia
(Redirected from Ayn Sof)
Jump to: navigation, search
Ein Sof, or Ayn Sof, (/n sɒf/, Hebrew אין סוף), in Kabbalah, is understood as God prior to His self-manifestation in the production of any spiritual Realm, probably derived from Ibn Gabirol's term, "the Endless One" (she-en lo tiklah). Ein Sof may be translated as "no end", "unending", "there is no end", or infinite.
The Zohar explains the term "Ein Sof" as follows:
In other words, "Ein Sof" signifies "the nameless being." In another passage the Zohar reduces the term to "Ein" (non-existent), because God so transcends human understanding as to be practically non-existent.[2]
In addition to the Sefer Yetzirah and the Zohar, other well-known explications of the relation between Ein Sof and all other realities and levels of reality have been formulated by the Jewish mystical thinkers of the Middle Ages, such as Isaac the Blind and Azriel.[3] Judah Ḥayyaṭ, in his commentary Minḥat Yehudah on the Ma'areket Elahut, gives the following explanation of the term "Ein Sof":
The Ten Sefirot[edit]
According to Gershom Scholem, the Ein Sof is the emanator of the ten sefirot. Sefirot are energy emanations found on the Kabbalistic Tree of Life.[3] Ein Sof, the Atik Yomin ("Ancient of Days"), emanates the sefirot into the cosmic womb of the Ayin in a manner that results in the created universe. The three letters composing the word "Ayin," (אי״ן) indicate the first three purely intellectual sefirot, which precede any emotion or action.[4] The order of devolution can be described as:
000. Ayin (Nothing; אין)
00. Ein Sof (Limitlessness; אין סוף)
0. Ohr Ein Sof (Endless Light; אור אין סוף)
-.Tzimtzum (Contraction; צמצום)
1. Keter (Crown; כתר)
2. Chokhmah (Wisdom; חכמה)
3. Binah (Understanding; בינה)
4. Chesed or Gedulah (Loving Kindness or Mercy; חסד)
5. Gevurah or Din (Power or Judgement; גבורה)
6. Tiferet (Beauty or Compassion; תפארת)
7. Netzach (Triumph or Endurance; נצח)
8. Hod (Majesty or Splendor; הוד)
9. Yesod (Foundation; יסוד)
10. Malchut (Realm; מלכות)
The ten sefirot were preceded by a stage of concealment called tzimtzum, which "allows space" for creations to perceive themselves as separate existences from their Creator. The sefirot exhibit reflection in sets of triads between more exalted states of being (or "non-being," when "otherness" does not yet exist) and the lower, more mundane levels of existence:
• Ayin, Ein Sof, Ohr Ein Sof
• Keter, Chokhmah, Binah
• Chesed, Gevurah, Tiferet
• Netzach, Hod, Yesod
Water pouring into a glass
The sefirot consist of lights invested in vessels, similar to water poured into a glass. While taking on the shape of the glass, the water is essentially unchanged.
Concerned that misinterpretation could lead to the idolatrous belief of duality or multiplicity in God, the Kabbalists frequently stress that the sefirot are bound up in the Ein Sof, and that without the Ein Sof the sefirot have no existence. However, there is an apparent contradiction, since in Kabbalah, the sefirot are sometimes called Divine in themselves, despite the assertion that they are only vehicles to manifest God. Moshe Cordovero, who gave the first full systemization of Kabbalah in the 16th century, resolved the contradiction, explaining that the sefirot consist of lights invested in vessels. In detail, whereas the vessels are differentiated vehicles for creation, the light is the undifferentiated Light of the Ein Sof. This is similar to how water poured into differently-shaped vessels will take on the vessels' forms, or how light streaming through different colors of glass appears in different colors. Despite the change in appearance, the water and the light emanate from a single source and are essentially unchanged; the vessels merely serve to filter and veil the light to reveal different aspects of the Creator, and to permit creations to benefit from His Light. This explanation was accepted and expanded upon in later works of Kabbalah and Chassidut.[5][6]
Hasidic Judaism in the 18th century internalised the esoteric, transcendent emanations of Kabbalah into immanent, psychological perception and correspondence.[7] The term in Hasidic philosophy for the Divine source is "Atzmus" (Essence). While the Ein Sof of Kabbalah can only be infinite, Atzmus, rooted higher in the Godhead, is beyond finite/infinite duality. As the Etzem, it both transcends all levels, and permeates all levels. This is reflected in the paradoxical Acosmic Monism of Hasidic Panentheism, and relates to the essence of the Torah and the soul. In Hasidic thought, Kabbalah corresponds to the World of Atzilus, the sephirah of Chochmah and the transcendent soul level of Chayah; Hasidic philosophy corresponds to the World of Adam Kadmon, the sephirah of Keter and the soul essennce of Yechidah.[8] The Baal Shem Tov taught that the only reflection of Atzmus is the sincerity of the soul in performing the Jewish observances and prayer. Consequently, Hasidism gave new emphasis to the common folk, and to prayer and action over traditionally pre-eminent Torah study, as Atzmus is most reflected in the lowest levels, the purpose of Creation in making a "Dwelling Place" for God in the lowest Realms. In response, Chaim Volozhin, the main theological theorist of the Misnagdim, opposed Hasidic Panentheism and re-emphasised Talmudic study.[9]
See also[edit]
1. ^ Zohar, part ii., section "Bo," 42b
2. ^ Zohar, ib. part iii. 288b
3. ^ a b Scholem, Gershom (1974). Kabbalah. Jewish Publication Society. pp. 88 and ff.
4. ^ Shoshan Sodot, 1b
5. ^ Tanya, ch. 2, author's note.
6. ^ Hemshech Samech Vov, pp. 3-4, 6.
7. ^ Overview of Chassidut from inner.org
8. ^ On the essence of Chassidus, Kehot publications, New York
9. ^ Torah for Torah's sake in the works of Haim Volozhin and his contemporaries, Norman Lamm, Yeshivah University
• This article incorporates text from a publication now in the public domain"En Sof". Jewish Encyclopedia. 1901–1906.
• Ehrenpreis (1895). Die Entwickelung der Emanationslehre in der Kabbala des XIII. Jahrhunderts. Frankfort-on-the-Main. p. 26.
• Franck (1889). La Kabbale. Paris. p. 136.
• Ginsburg, Christian David (1865). The Ḳabbalah. London. p. 105.
• Joël (1849). Die Religionsphilosophie des Sohar. Leipsic.
• Karppe (1901). Etude sur les Origines et la Nature du Zohar. Paris. p. 344.
• Myer (1888). Qabbalah. Philadelphia. pp. 251 et seq.
• Scholem, Gershom (1974). Kabbalah. Jewish Publication Society. |
global_01_local_0_shard_00000017_processed.jsonl/36436 | Cedar Hills, Oregon
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Cedar Hills, Oregon
Census-designated place (CDP)
Cedar Hills Boulevard and Walker Road
Cedar Hills Boulevard and Walker Road
Location of Cedar Hills, Oregon
Location of Cedar Hills, Oregon
Coordinates: 45°30′17″N 122°47′54″W / 45.50472°N 122.79833°W / 45.50472; -122.79833Coordinates: 45°30′17″N 122°47′54″W / 45.50472°N 122.79833°W / 45.50472; -122.79833
Country United States
State Oregon
County Washington
Established 1946
• Total 2.3 sq mi (6.0 km2)
• Land 2.3 sq mi (6.0 km2)
• Water 0.0 sq mi (0.0 km2)
Elevation 282 ft (86 m)
Population (2010)
• Total 8,300
• Density 3,880.9/sq mi (1,498.4/km2)
Time zone Pacific (PST) (UTC-8)
• Summer (DST) PDT (UTC-7)
ZIP codes 97005, 97225
Area code(s) 503 and 971
FIPS code 41-12050[1]
GNIS feature ID 1136130[2]
Cedar Hills is a census-designated place and neighborhood in Washington County, Oregon, near the intersection of highways Oregon Route 217 and U.S. 26. Constructed starting in 1946, Cedar Hills was the largest single housing tract development in the western United States at the time of its completion in 1961.[citation needed]
Originally located in unincorporated Washington County, part of the neighborhood has since been annexed by the city of Beaverton, and in a plan agreed to by the county and Beaverton the remainder is scheduled for annexation in the future.
The formal Cedar Hills neighborhood currently includes 2,114 homes,[3] whose owners are subject to the rules and covenants enforced by the area's homeowners' association, the Homes Association of Cedar Hills.[4]
The population was 8,949 at the 2000 census.
Plans to build the large new neighborhood were announced by the project's developers in April 1946, and construction of the first 50 homes had begun by then.[5] Along with roads and utilities, the plans included a shopping center, schools, parks and churches,[5] in a neighborhood of around 2,000 homes on about 800 acres (320 ha).[6] A writer for The Oregonian newspaper at the time called it "the most ambitious surburban housing development ever attempted in the Northwest".[6]
Construction of the planned shopping center began in 1954.[7] Located immediately south of the Sunset Highway, at the northern end of the neighborhood, Cedar Hills Shopping Center opened in April 1955.[8] It originally included a Safeway supermarket (opened in August 1954, months earlier than the remainder of the center),[9] a Rodgers five-and-dime, a Sears catalog store, and several other shops, along with a bank and a gas station. The center's tall neon sign became a local landmark. In 1979, TriMet opened a bus transit center on Wilshire Street, behind the shopping center.[10] Cedar Hills Transit Center remained in operation for almost 20 years, until replaced by the Sunset Transit Center – located immediately across the Sunset Highway (US 26) freeway from Cedar Hills Shopping Center – in 1998, with the opening of the Westside MAX line. The Sunset TC's construction included a long pedestrian bridge over the freeway, to provide access between the TriMet bus and MAX station and the Cedar Hills neighborhood. In 2009, the Oregon Department of Transportation opened a new Driver and Motor Vehicle Services Division (DMV) office in the Cedar Hills Shopping Center, serving as the DMV's Beaverton office, replacing one located on Allen Blvd. in Beaverton proper.[11]
According to the United States Census Bureau, the neighborhood has a total area of 2.3 square miles (6.0 km2), of which, 2.3 square miles (6.0 km2) of it is land and 0.43% is water.
As of the census[1] of 2000, there were 8,949 people, 3,749 households, and 2,361 families residing in the neighborhood. The population density was 3,880.9 people per square mile (1,495.8/km²). There were 3,926 housing units at an average density of 1,702.6 per square mile (656.2/km²). The racial makeup of the CDP was 83.28% White, 1.32% African American, 0.57% Native American, 4.78% Asian, 0.35% Pacific Islander, 6.05% from other races, and 3.65% from two or more races. Hispanic or Latino of any race were 11.21% of the population.
The neon sign tower at the Cedar Hills Shopping Center is a local landmark.
There were 3,749 households out of which 28.9% had children under the age of 18 living with them, 49.4% were married couples living together, 9.8% had a female householder with no husband present, and 37.0% were non-families. 29.0% of all households were made up of individuals and 9.0% had someone living alone who was 65 years of age or older. The average household size was 2.39 and the average family size was 2.94.
In the neighborhood the population was spread out with 23.0% under the age of 18, 7.7% from 18 to 24, 33.4% from 25 to 44, 23.4% from 45 to 64, and 12.5% who were 65 years of age or older. The median age was 36 years. For every 100 females there were 98.4 males. For every 100 females age 18 and over, there were 96.8 males.
Cedar Hills Park
The median income for a household in the neighborhood was $48,200, and the median income for a family was $56,401. Males had a median income of $42,293 versus $29,922 for females. The per capita income for the CDP was $26,812. About 3.9% of families and 6.5% of the population were below the poverty line, including 7.8% of those under age 18 and 3.0% of those age 65 or over.
See also[edit]
3. ^ Homes Association of Cedar Hills Retrieved May 6, 2013.
4. ^ About Us. Homes Association of Cedar Hills. Retrieved May 6, 2013.
5. ^ a b "2000-Home Community Rising Here; Two Firms Launch $25,000,000 Town In Beaverton Area" (April 28, 1946). The Sunday Oregonian, p. 1; also section 2, p. 1.
6. ^ a b Shoemaker, Mervin G. (September 29, 1946). "Cedar Hills: Something New in Building". The Sunday Oregonian, Sunday magazine section, p. 2.
7. ^ "$1,000,000 Cedar Hills Shopping Project Started; Second Phase of Big Center to House 27 Shops" (June 20, 1954). The Sunday Oregonian, section 2, p. 8.
8. ^ "Cedar Hills Shop Center Opening" (April 3, 1955). The Sunday Oregonian, section 2, p. 7.
9. ^ "Outlet Added By Safeway: $250,000 Store Opens in Cedar Hills" (August 22, 1954). The Sunday Oregonian, p. 48.
10. ^ Bodine, Harry (June 19, 1979). "Tri-Met west side transfers pass muster". The Oregonian, p. B4.
11. ^ "DMV to open new Beaverton office April 28". Oregon Department of Transportation. April 14, 2009. Retrieved May 6, 2013. |
global_01_local_0_shard_00000017_processed.jsonl/36438 | Flag of the United Nations
From Wikipedia, the free encyclopedia
Jump to: navigation, search
United Nations
Flag of the United Nations.svg
Proportion 2:3 or 3:5[1]
Adopted December 7, 1946
Design A white UN emblem (world map surrounded by two olive branches) on a blue background.
Designed by Donal McLaughlin (emblem only)
The flag flying at United Nations Plaza in the Civic Center, San Francisco, California
FIAV historical.svg The first version of the UN flag, April 1945.
—Official Seal and Emblem of the United Nations, Report of the Secretary-General, 15 October 1946[2]
The blue that appears in the background of the insignia was chosen to be "the opposite of red, the war colour", [5] although the exact shade has never been officially specified by the United Nations.[6] The original colour the group chose in 1945 was a gray blue that differs from the current United Nations flag. The globe used in the original design was an azimuthal projection focused on the North Pole with the United States, the host nation of the conference, at the centre. The projection that was used cut off portions of the Southern Hemisphere at the latitude of Argentina, which was acceptable at the time, as Argentina was not planned to be an original member of the United Nations.[7] The projection was later altered so that no country will be at prominence within the flag. The new logo was now designed so that the globe is bisected in the centre by the Prime Meridian and the International Date Line.
White and blue are the official colours of the United Nations.
According to the Convention on the Safety of United Nations and Associated Personnel, the emblem and the flag of the United Nations can be used by the personnel and material of UN peacekeeping missions as a protective sign to prevent attacks during an armed conflict.
Derived flags
Agencies and organizations
• The flag of the World Food Programme has the olive leaves of the UN flag, with a hand clutching grains in the centre, in place of the globe. The white/blue colours of the UN flag are reversed in the WFP flag.
Image Entity abbrev. Entity name Image description
Flag of IAEA.svg IAEA International Atomic Energy Agency The IAEA has a flag with the same colours and olive leaves as the United Nations. The central symbol is a Rutherford model atom. The IAEA is independent of but reporting to the United Nations.
Flag of ICAO.svg ICAO International Civil Aviation Organization Is that of the UN with pilot's wings superimposed.
Flag of ILO.svg ILO International Labour Organization Is that of the UN, but replacing the map with an interrupted gear wheel with the letters "ILO" inside it.
Flag of the International Maritime Organization.svg IMO International Maritime Organization Takes the UN flag, shrinks the map image and puts a chained cross of anchors behind it.
Flag of ITU.svg ITU International Telecommunication Union Has the ITU logo—a globe, lightning bolt, and the letters "ITU".
Flag of UNESCO.svg UNESCO United Nations Educational, Scientific and Cultural Organization Has the same colours as the United Nations; its symbol is a Greek temple (possibly the Parthenon), representing science, learning and culture. The six columns are made of the letters of the organization's name.
Flag of UNICEF.svg UNICEF United Nations Children's Fund Has the leaves and globe of the UN flag but with a mother and child inlay instead of the world map.
Flag of UPU.svg UPU Universal Postal Union Is UN blue with the organization's logo in white.
Flag of WHO.svg WHO World Health Organization Identical to the UN flag, with a Rod of Asclepius, a traditional symbol of medicine, added.
Flag of the World Meteorological Organization.svg WMO World Meteorological Organization The flag is that of the UN with a compass rose and the letters "OMM/WMO" atop the globe.
Country flags
• The flag of Somalia, with central symbol a five-pointed star, uses the UN's blue colour in honour of the UN's help in gaining Somalia's independence.[9][10]
• The UNTAC UN administration of Cambodia used UN colours.[11]
Proposed flags
• A proposed flag for a United Nations Parliamentary Assembly uses the same colours and olive branches and uses the cartographic elements of the globe to create what appear to be parliamentary benches.
Use outside UN
1. ^ or using the same proportions of the national flag of whatever country it is flown in, with the emblem being centred and one half of the hoist.
2. ^ UN General Assembly A/107, Official Seal and Emblem of the United Nations, 15 October 1946
3. ^ Bertram, Hulen. "Origin of the UNO Seal", The New York Times, March 10, 1946. Accessed January 4, 2009.
4. ^ Lyons, Catherine. "UN Logo Designer Celebrates His Centennial", United Nations Association, c. 1975. Accessed January 4, 2009.
5. ^ UN General Assembly A/107, Official Seal and Emblem of the United Nations, 15 October 1946. Accessed March 15, 2010.
6. ^ Flags Of The World, United Nations Organization, Flag Colour. Accessed March 15, 2010.
7. ^ Heller, Steven. "Oliver Lincoln Lundquist, Designer, Is Dead at 92 ", The New York Times, January 3, 2009. Accessed January 4, 2009.
8. ^ Flags Of The World, United Nations Organization, UN Flag, 1945
9. ^ Znamierowski, Alfred. The World Encyclopedia of Flags. p. 222. ISBN 0-7548-0167-5.
10. ^ Talocci, Mauro. Smith, Whitney, ed. Guide to the Flags of the World. p. 131. ISBN 0-688-01141-1.
11. ^ "Cambodian flag history".
12. ^ Flag of Antarctica#Graham Bartram
13. ^ Flag of Bosnia and Herzegovina#Alternative flag variations (change of flag)
14. ^ "New banknotes". Sveriges Riksbank. Retrieved 1 June 2013.
External links |
global_01_local_0_shard_00000017_processed.jsonl/36440 | Girolamo Zanchi
From Wikipedia, the free encyclopedia
(Redirected from Hieronymus Zanchi)
Jump to: navigation, search
Jerome Zanchius
Girolamo Zanchi (Latin "Hieronymus Zanchius," thus Anglicized to "Jerome Zanchi/Zanchius") (February 2, 1516 – November 19, 1590) was an Italian Protestant Reformation clergyman and educator.
Even after Vermigli’s forced flight in 1542, Zanchi remained as a teacher at the monastery school. In 1551, however, he also was forced into exile. After a brief stay in Geneva, he wanted to go to England, but was called to Strasbourg and worked there as a professor of the Old Testament at the college of St. Thomas. His style is legalistic, and he interpreted with meticulous accuracy. In his overall theological orientation, he tacked neither directly along a Lutheran or a Calvinist line, although he was reckoned a Calvinist. He was one of the most learned theologians of the second half of the 16th Century, if he is not considered to be an especially original thinker. He was regarded an excellent teacher.
Zanchius was a voluminous writer whose works include, Confession of the Christian Religion and Observation on the Divine Attributes. He is perhaps best known for his book The Doctrine of Absolute Predestination, which is still in publication today.
'Here Zanchius rests, whom love of truth constrained
to quit his own and seek a foreign land.
How good and great he was, how formed to shine,
How fraught with science human and divine;
Sufficient proof his numerous writings give,
And those who heard him teach and saw him live.
Earth still enjoys him, though his soul has fled:
His name is deathless, though his dust is dead.'
1. ^ Farthing, John L. (2007). "Zanchi, Jerome". In Donald K. McKim. Dictionary of major biblical interpreters (2nd ed.). Downers Grove, Ill.: IVP Academic. pp. 1076–1080. ISBN 9780830829279.
Further reading[edit]
• Cuno (1898), "Zanchius, Hieronymus", Allgemeine Deutsche Biographie (ADB) (in German) 44, Leipzig: Duncker & Humblot, pp. 679–683
• Erich Wenneker (1998). "Girolamo Zanchi". In Bautz, Traugott. Biographisch-Bibliographisches Kirchenlexikon (BBKL) (in German) 14. Herzberg: Bautz. ISBN 3-88309-073-5.
• Theologische Realenzyklopädie, volume 36, pp. 482–485
• Burchill, Christopher J. “Girolomo Zanchi: Portrait of a Reformed Theologian and his Work.” Sixteenth Century Journal 15 (1984): 185-205.
• Burnett, Amy Nelson. "Simon Sulzer and the Consequences of the 1563 Strasbourg Consensus in Switzerland," Archiv für Reformationsgeschichte, 88 (1992): 154-179
• Kittelson, James. “Marbach vs. Zanchi: the Resolution of Controversy in Later Reformation Strasbourg.” Sixteenth Century Journal 7 (1977): 31-44.
• Zanchius, Jerom. "The Doctrine of Absolute Predestination" translated by Augustus M. Toplady. Baker Book House, Grand Rapids, Michigan, USA, 1977. ISBN 0-8010-9927-7.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36441 | Jan Gruter
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Jan Gruter
Jan Gruter (or Gruytere) (Latinized Janus Gruterus) (3 December 1560 – 20 September 1627) was a Dutch critic and scholar.
Jan Gruter was Dutch on his father's side and English on his mother's, and was born at Antwerp. To avoid religious persecution from Spanish forces in the early stages of the Eighty Years' War, his parents emigarated to England while he was a child. For some years he studied at Caius College, Cambridge,[1] after which he went to Leiden, where he graduated with an M.A.
In 1586, Gruter was appointed professor of history at the University of Wittenberg, but, as he refused to subscribe the formula concordiae, he lost his position. From 1589 to 1592, he taught at Rostock, after which he went to Heidelberg, where in 1602 he was appointed librarian to the university. He died at Bierhelderhof, Heidelberg.
Gruter's chief works were his Inscriptiones antiquae totius orbis Romani[2] (2 vols., Heidelberg, 1603), and Lampas, sive fax artium liberalium[3] (7 vols., Frankfort-am-Main, 1602–1634).
|
global_01_local_0_shard_00000017_processed.jsonl/36442 | Karl Berndtsson
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Karl Mathias Berndtsson Kullberg (16 March 1892 – 29 September 1943) was a Swedish chess master who was born and died in Göteborg.
He won at Copenhagen 1916,[1] and lost a match for the Swedish Chess Championship to Gustaf Nyholm (1½–3½) in 1917. He was first in the national tournaments in 1918, 1920, 1921 (jointly), and 1926. He took 14th at Göteborg 1920 (Paul Johner won),[2] won Nordic Chess Championship at Oslo 1928,[3] and took 6th at Örebro 1935 (Alexander Alekhine won).[4]
Berndtsson played for Sweden in three Chess Olympiads:
and won team bronze medal in 1933.[5]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36444 | Mercury in the fiction of Leigh Brackett
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The planet Mercury appears frequently as a setting for many of the stories of Leigh Brackett, and Mercury and Mercurians are frequently mentioned in other stories of the Leigh Brackett Solar System. Brackett's Mercury shares some characteristics with the astronomical Mercury, but in other respects functions as a consistent fantasy world with recurring landmarks and characteristics that reappear from story to story. Some of these fantasy characteristics are of Brackett's own invention; others reflect some of the scientific theories about Mercury that were current before the mid-1960s. Readers of this article are advised not to depend upon it for scientific or astronomical information but instead to consult the article Mercury (planet).
Astronomical characteristics[edit]
Mercury in the Solar System stories of Leigh Brackett is the closest planet to the Sun. Its most notable characteristic is that it is tidally locked to the Sun, that is, it makes a full rotation once for each of its 88-day orbits. As a result, it keeps the same face directed towards the Sun at all times, just as the same side of the Moon always faces the Earth. The sun-facing side is known as the Sunside; the side facing away from the sun is called the Darkside.
A Mercurian sidereal day (the period of rotation) lasts about 87.97 Earth days, but since Mercury does not rotate with respect to the Sun, there is no such thing as a solar day or night in usual sense. However, although the times of rotation and revolution are identical, due to Mercury's eccentric orbit, the subsolar point varies in position by up to 20° east or west of the mean. An observer standing on the boundary between Sunside and Darkside at perihelion could observe the sun set below the horizon, only to rise again at aphelion, stay in the sky for 44 Earth days, and then set again at perihelion (an observer on the other side of the planet would see the opposite sequence). Observers closer to the mean antisolar point would observe a shorter day, those closer to the subsolar point would observe a longer one. As a result, there is a strip, over 500 km wide at the equator and narrowing toward the poles, where there is an 88-day long day-night cycle; this region is known as the "Twilight Belt".
Although Mercury possesses a breathable oxygen atmosphere close to its surface, most of the planet is uninhabitable, as surface temperatures on Mercury range from metal-melting temperatures in the immediate subsolar point in the center of the side of Mercury facing the Sun (the Sunside) to cold enough to liquefy oxygen on the side of Mercury facing away from the Sun (the Darkside). In the Twilight Belt, however, temperatures fluctuate between Sunside heat and Darkside cold; in a few places, there is a habitable zone where temperatures are not too extreme for life.
Mercury also has a highly eccentric orbit, which slowly slowly precesses around the Sun. Some scientists hypothesize that another planet may exist in an orbit even closer to the Sun to account for this perturbation. This hypothetical planet has been named Vulcan.
Nothing is known of the pre-history of Mercury before the arrival of the Terrans. There is evidence of an ancient, long-lived race of silicon-based life-forms, but their day had passed long before the Terrans came (Shannach-The Last). The only intelligent forms of life found on Mercury were small furred humanoids, who lived a Stone-Age existence among the rocks of the Twilight Belt by hunting the rock-lizard.
The Terrans who came to Mercury were primarily involved in exploiting Mercury's rich mineral resources under the auspices of various companies, such as Mercury Metals and Mining and the similarly named (if not identical) Mercurian Metals. Few of them were adequately prepared for the rigors of the life; the brutal climate of Mercury, its swings between heat and cold, its electrical storms, and its severe exposure to solar radiation caused a terrible mortality. Terro-Mercurians tend to have ebony-black skin and dark hair, by which they can generally be recognized throughout the Solar System (Shadow over Mars; Queen of the Martian Catacombs).
Mineral resources[edit]
Mercury possesses an abundance of rare and heavy metals that are rare on Earth and unknown in other parts of the Solar System, including: copper; Yttrium, used for armaments (The Demons of Darkside); pitchblende, from which Radium and Uranium can be extracted (A World is Born); and the rare radioactive crystal known as the sun-stone (Shannach – the Last).
Life in the Twilight Belt[edit]
The inhabited regions of the Twilight Belt are not a single area, but a honeycomb of valleys, some containing hot springs, each separated from the others by sheer volcanic cliffs, taller than Earth's Mount Everest. As the atmosphere of Mercury is extremely shallow, communication between the valleys can only occur by those possessing a breathing apparatus, as the mountain peaks reach into virtually airless space. Mercury has only one notable concentration of population, in the Trade City of Solar City (aka Sun City). Due to the strong electromagnetic field surrounding Mercury and the storms generated by the sharp twilight transition between heat and cold, the Twilight Belt is marked by powerful electric discharges. (A World is Born). The storms are worst at perihelion; the Terro-Mercurian colonists use metal pylons and copper cables to channel and collect the electric power from the charged atmosphere. Metals tend to become highly magnetized under these conditions, and normal navigational instruments are rendered useless.
Mercurian aborigines[edit]
Mercury is known to have evolved three forms of sentient life. Among these were a group of glacially-slow silicon-based life-forms that were almost extinct by the time the first settlers arrived; the crystalline life-forms of the Darkside (see below), that remained largely unknown to the settlers save as rumor; and the furry aborigines of the closed valleys of the Twilight Belt.
The furry aborigines were non-human, but humanoid, and had achieved a barely Stone Age existence before the arrival of the settlers. They were patriarchal and clannish, living by hunting rock-lizards. Male children hunted with wooden spears, and were forbidden certain quarries; when they came of age, if they were successful in the ritual of the Man's Hunt, they were awarded flint spears and became members of the community (Enchantress of Venus).
Although the aborigines had little physical power compared to the human settlers of Mercury, and many were ruthlessly massacred by the least scrupulous of the mineral exploiters, they were not to be underestimated. The aborigines inhabiting the cliff-caves of Arianrhod, near the Darkside, had developed a powerful form of telepathy, capable of discerning events across a planet; this skill was learned by the Terro-Mercurian Jaffa Storm (Shadow over Mars). They could be very friendly to humans on occasion, for instance adopting the orphaned Eric John Stark and raising him to adulthood.
Despite the harshness of its environment, Mercury has evolved its own remarkable fauna, including:
• Rock lizards, carnivorous reptiles growing to an immense size, hunted by the Mercurian aborigines.
• Flying lizards, jet-black pterodactyl-like creatures with yellow stomachs (Shannach – the Last).
• Electric beasts, a form of energy-life feeding on the lightning generated in the Mercurian atmosphere, and attracted to metal (A World is Born).
• Mercurian cave-cats or cave-tigers, twenty feet long with four pale eyes, eight legs and a tail armed with bone barbs (The Halfling).
• Mercurian hunting bats, metallic purple and green in color, with wings and fangs. They are attracted to salt, and their bodies are sheathed in silicate scales (similar to glass) that protect them from the lightning (Cube from Space).
The Darkside[edit]
The cold and airless Darkside of Mercury is little known, as only a few travellers have entered that region and survived. Currents generated by Mercury's passage through the Sun's electromagnetic field prevent radio communication and would damage the instruments of any rocket that attempted to land there. Furthermore, for some time, those who returned were afflicted by a morbid psychosis that was fancifully attributed to "demons". This was eventually traced to a form of intelligent life inhabiting a crystalline matrix and possessing the power to affect mind-waves. These life-forms have since become quiescent and no longer pose a hazard (The Demons of Darkside).
See also[edit]
Core Mercury stories[edit]
Marginal Mercury stories[edit]
Non-Mercury stories[edit]
• The Halfling (novelette; Astonishing Stories February 1943)
• The Citadel of Lost Ships (Planet Stories March 1943)
• The Beast-Jewel of Mars (novelette; Planet Stories Winter 1948)
• Queen of the Martian Catacombs (Planet Stories Summer 1949) published in book form as The Secret of Sinharat
• Black Amazon of Mars (Planet Stories March 1951) published in book form as People of the Talisman |
global_01_local_0_shard_00000017_processed.jsonl/36445 | Moving average crossover
From Wikipedia, the free encyclopedia
(Redirected from Moving-average crossover)
Jump to: navigation, search
Moving average crossover of a 15-day exponential close-price MA (red) crossing over a 50-day exponential close-price MA (yellow).
In the statistics of time series, and in particular the analysis of financial time series for stock trading purposes, a moving-average crossover occurs when, on plotting two moving averages each based on different degrees of smoothing, the traces of these moving averages cross. It does not predict future direction but shows trends. This indicator uses two (or more) moving averages, a slower moving average and a faster moving average. The faster moving average is a short term moving average. For end-of-day stock markets, for example, it may be 5, 10 or 25 day period while the slower moving average is medium or long term moving average (e.g. 50, 100 or 200 day period). A short term moving average is faster because it only considers prices over short period of time and is thus more reactive to daily price changes. On the other hand, a long term moving average is deemed slower as it encapsulates prices over a longer period and is more lethargic. However, it tends to smoothen out price noises which are often reflected in short term moving averages.
A moving average, as a line by itself, is often overlaid in price charts to indicate price trends. A crossover occurs when a faster moving average (i.e., a shorter period moving average) crosses a slower moving average (i.e. a longer period moving average). In other words, this is when the shorter period moving average line crosses a longer period moving average line. In stock investing, this meeting point is used either to enter (buy or sell) or exit (sell or buy) the market.
The particular case where simple equally-weighted moving-averages are used is sometimes called a simple moving-average (SMA) crossover. Such a crossover can be used to signal a change in trend and can be used to trigger a trade in a Black Box trading system. |
global_01_local_0_shard_00000017_processed.jsonl/36446 | Nadeau, California
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Nadeau is a former settlement in the Tehachapi Mountains, in Kern County, California.[1]
It was located on the railroad 5 miles (8 km) east of Cameron, and west of Tehachapi, California.[1]
See also[edit]
• Remi Nadeau - a regional historian, author, and pioneer family descendent.
Coordinates: 33°57′56″N 118°14′35″W / 33.96556°N 118.24306°W / 33.96556; -118.24306 |
global_01_local_0_shard_00000017_processed.jsonl/36448 | Peter M. Neumann
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Peter Neumann
Peter Neumann, 2013
Born (1940-12-28) 28 December 1940 (age 73)
Oxford,[1] Oxfordshire, England
Residence Oxford
Nationality British
Fields Algebra and history of algebra
Institutions University of Oxford
Alma mater The Queen's College, Oxford
Doctoral advisor Graham Higman
Doctoral students Peter Cameron
Colin McNab
Cheryl Praeger
Peter Michael Neumann OBE (born 28 December 1940) is a British mathematician. He is the son of the mathematicians Bernhard Neumann and Hanna Neumann and, after gaining a B.A. from The Queen's College, Oxford in 1963, obtained his D.Phil from Oxford University in 1966.
He was a Tutorial Fellow at the Queen's College, Oxford and a lecturer at Oxford University.[2] After retiring in 2008, he became an Emeritus Fellow at the Queen's College. His work has been in the field of group theory. He is also known for solving Alhazen's problem in 1997.[3]
In 1987, he won the Lester R. Ford Award of the Mathematical Association of America for his review of Harold Edwards' book Galois Theory.[4] In 2003, the London Mathematical Society awarded him the Senior Whitehead Prize.[5] He was the first Chairman of the United Kingdom Mathematics Trust, from October 1996 to April 2004, succeeded by Bernard Silverman.[6] He was appointed Officer of the Order of the British Empire (OBE) in the 2008 New Year Honours.[7]
1. ^ "Dr Peter M Neumann, O.B.E.". The Queen’s College, Oxford. Retrieved 2009-06-26.
2. ^ "Enumeration of Finite Groups (Cambridge Tracts in Mathematics) — About the Author". Retrieved 2007-12-30.
3. ^ Highfield, Roger (1 April 1997). "Don solves the last puzzle left by ancient Greeks". Electronic Telegraph 676. Retrieved 2012-11-19
4. ^ The Lester R. Ford Award, MAA, retrieved 2010-02-01.
5. ^ London Mathematical Society. "List of Prizewinners". Retrieved 2007-07-08.
6. ^ United Kingdom Mathematics Trust (2004). The UK Mathematics Trust Yearbook 2003–2004. ISBN 0953682358.
7. ^ "Officers of the Order of the British Empire". BBC. p. 32. Retrieved 27 January 2010.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36449 | From Wikipedia, the free encyclopedia
(Redirected from Proton mass)
Jump to: navigation, search
Quark structure proton.svg
Classification Baryon
Composition 2 up quarks, 1 down quark
Statistics Fermionic
Interactions Gravity, Electromagnetic, Weak, Strong
Symbol p, p+, N+
Antiparticle Antiproton
Theorized William Prout (1815)
Discovered Ernest Rutherford (1917–1919, named by him, 1920)
1.672621777(74)×10−27 kg[1]
938.272046(21) MeV/c2[1]
1.007276466812(90) u[1]
Mean lifetime >2.1×1029 years (stable)
Electric charge +1 e
1.602176565(35)×10−19 C[1]
Charge radius 0.8775(51) fm[1]
Electric dipole moment <5.4×10−24 e·cm
Electric polarizability 1.20(6)×10−3 fm3
Magnetic moment
1.410606743(33)×10−26 J·T−1[1]
1.521032210(12)×10−3 μB[1]
2.792847356(23) μN[1]
Magnetic polarizability 1.9(5)×10−4 fm3
Spin 12
Isospin 12
Parity +1
Condensed I(JP) = 12(12+)
The proton is a subatomic particle with the symbol p or p+ and a positive electric charge of 1 elementary charge. One or more protons are present in the nucleus of each atom. Protons and neutrons are collectively referred to as "nucleons". The number of protons in the nucleus of an atom is referred to as its atomic number. Since each element has a unique number of protons, each element has its own unique atomic number. The name proton was given to the hydrogen nucleus by Ernest Rutherford in 1920, because in previous years he had discovered that the hydrogen nucleus (known to be the lightest nucleus) could be extracted from the nuclei of nitrogen by collision, and was thus a candidate to be a fundamental particle and building block of nitrogen, and all other heavier atomic nuclei.
In the modern Standard Model of particle physics, the proton is a hadron, and like the neutron, the other nucleon (particle present in atomic nuclei), is composed of three quarks. Prior to that model becoming a consensus in the physics community, the proton was considered a fundamental particle. In the modern view, a proton is composed of three valence quarks: two up quarks and one down quark. The rest masses of the quarks are thought to contribute only about 1% of the proton's mass. The remainder of the proton mass is due to the kinetic energy of the quarks and to the energy of the gluon fields that bind the quarks together.
Because the proton is not a fundamental particle, it possesses a physical size—although this is not perfectly well-defined since the surface of a proton is somewhat fuzzy, due to being defined by the influence of forces that do not come to an abrupt end. The proton is about 1.6–1.7 fm in diameter.[2]
At sufficiently low temperatures, free protons will bind to electrons. However, the character of such bound protons does not change, and they remain protons. A fast proton moving through matter will slow by interactions with electrons and nuclei, until it is captured by the electron cloud of an atom. The result is a protonated atom, which is a chemical compound of hydrogen. In vacuum, when free electrons are present, a sufficiently slow proton may pick up a single free electron, becoming a neutral hydrogen atom, which is chemically a free radical. Such "free hydrogen atoms" tend to react chemically with many other types of atoms at sufficiently low energies. When free hydrogen atoms react with each other, they form neutral hydrogen molecules (H2), which are the most common molecular component of molecular clouds in interstellar space. Such molecules of hydrogen on Earth may then serve (among many other uses) as a convenient source of protons for accelerators (as used in proton therapy) and other hadron particle physics experiments that require protons to accelerate, with the most powerful and noted example being the Large Hadron Collider.
Protons are spin-½ fermions and are composed of three valence quarks,[3] making them baryons (a sub-type of hadrons). The two up quarks and one down quark of the proton are held together by the strong force, mediated by gluons.[2] A modern perspective has the proton composed of the valence quarks (up, up, down), the gluons, and transitory pairs of sea quarks. The proton has an approximately exponentially decaying positive charge distribution with a mean square radius of about 0.8 fm.[4]
The spontaneous decay of free protons has never been observed, and the proton is therefore considered a stable particle. However, some grand unified theories of particle physics predict that proton decay should take place with lifetimes of the order of 1036 years, and experimental searches have established lower bounds on the mean lifetime of the proton for various assumed decay products.
Experiments at the Super-Kamiokande detector in Japan gave lower limits for proton mean lifetime of 6.6×1033 years for decay to an antimuon and a neutral pion, and 8.2×1033 years for decay to a positron and a neutral pion.[5] Another experiment at the Sudbury Neutrino Observatory in Canada searched for gamma rays resulting from residual nuclei resulting from the decay of a proton from oxygen-16. This experiment was designed to detect decay to any product, and established a lower limit to the proton lifetime of 2.1×1029 years.[6]
p+ + en + ν
Quarks and the mass of the proton[edit]
In quantum chromodynamics, the modern theory of the nuclear force, most of the mass of the proton and the neutron is explained by special relativity. The mass of the proton is about 80–100 times greater than the sum of the rest masses of the quarks that make it up, while the gluons have zero rest mass. The extra energy of the quarks and gluons in a region within a proton, as compared to the rest energy of the quarks alone in the QCD vacuum, accounts for almost 99% of the mass. The rest mass of the proton is, thus, the invariant mass of the system of moving quarks and gluons that make up the particle, and, in such systems, even the energy of massless particles is still measured as part of the rest mass of the system.
Two terms are used in referring to the mass of the quarks that make up protons: current quark mass refers to the mass of a quark by itself, while constituent quark mass refers to the current quark mass plus the mass of the gluon particle field surrounding the quark.[7] These masses typically have very different values. As noted, most of a proton's mass comes from the gluons that bind the constituent quarks together, rather than from the quarks themselves. While gluons are inherently massless, they possess energy—to be more specific, quantum chromodynamics binding energy (QCBE)—and it is this that contributes so greatly to the overall mass of the proton (see mass in special relativity). A proton has a mass of approximately 938 MeV/c2, of which the rest mass of its three valence quarks contributes only about 11 MeV/c2; much of the remainder can be attributed to the gluons' QCBE.[8]
The internal dynamics of the proton are complicated, because they are determined by the quarks' exchanging gluons, and interacting with various vacuum condensates. Lattice QCD provides a way of calculating the mass of the proton directly from the theory to any accuracy, in principle. The most recent calculations[9][10] claim that the mass is determined to better than 4% accuracy, even to 1% accuracy (see Figure S5 in Dürr et al.[10]). These claims are still controversial, because the calculations cannot yet be done with quarks as light as they are in the real world. This means that the predictions are found by a process of extrapolation, which can introduce systematic errors.[11] It is hard to tell whether these errors are controlled properly, because the quantities that are compared to experiment are the masses of the hadrons, which are known in advance.
These recent calculations are performed by massive supercomputers, and, as noted by Boffi and Pasquini: "a detailed description of the nucleon structure is still missing because ... long-distance behavior requires a nonperturbative and/or numerical treatment..."[12] More conceptual approaches to the structure of the proton are: the topological soliton approach originally due to Tony Skyrme and the more accurate AdS/QCD approach that extends it to include a string theory of gluons, various QCD-inspired models like the bag model and the constituent quark model, which were popular in the 1980s, and the SVZ sum rules, which allow for rough approximate mass calculations. These methods do not have the same accuracy as the more brute-force lattice QCD methods, at least not yet.
Charge radius[edit]
The internationally-accepted value of the proton's charge radius is 0.8768 fm (see orders of magnitude for comparison to other sizes). This value is based on measurements involving a proton and an electron.
However, since 5 July 2010, an international research team has been able to make measurements involving an exotic atom made of a proton and a negatively-charged muon. After a long and careful analysis of those measurements, the team concluded that the root-mean-square charge radius of a proton is "0.84184(67) fm, which differs by 5.0 standard deviations from the CODATA value of 0.8768(69) fm".[13] In January 2013, an updated value for the charge radius of a proton—0.84087(39) fm—was published. The precision was improved by 1.7 times, but the difference with CODATA value persisted at 7σ significance.[14]
The international research team that obtained this result at the Paul Scherrer Institut (PSI) in Villigen (Switzerland) includes scientists from the Max Planck Institute of Quantum Optics (MPQ) in Garching, the Ludwig-Maximilians-Universität (LMU) Munich and the Institut für Strahlwerkzeuge (IFWS) of the Universität Stuttgart (both from Germany), and the University of Coimbra, Portugal.[15][16] They are now attempting to explain the discrepancy, and re-examining the results of both previous high-precision measurements and complicated calculations. If no errors are found in the measurements or calculations, it could be necessary to re-examine the world's most precise and best-tested fundamental theory: quantum electrodynamics.[17]
Interaction of free protons with ordinary matter[edit]
Although protons have affinity for oppositely-charged electrons, free protons must lose sufficient velocity (and kinetic energy) in order to become closely associated and bound to electrons, since this is a relatively low-energy interaction. High energy protons, in traversing ordinary matter, lose energy by collisions with atomic nuclei, and by ionization of atoms (removing electrons) until they are slowed sufficiently to be captured by the electron cloud in a normal atom.
Proton in chemistry[edit]
Atomic number[edit]
with 35 − 17 = 18 neutrons and 37
with 37 − 17 = 20 neutrons.
Hydrogen ion[edit]
The transfer of H+
Proton nuclear magnetic resonance (NMR)[edit]
Ernest Rutherford at the first Solvay Conference, 1911
Rutherford knew hydrogen to be the simplest and lightest element and was influenced by Prout's hypothesis that hydrogen was the building block of all elements. Discovery that the hydrogen nucleus is present in all other nuclei as an elementary particle, led Rutherford to give the hydrogen nucleus a special name as a particle, since he suspected that hydrogen, the lightest element, contained only one of these particles. He named this new fundamental building block of the nucleus the proton, after the neuter singular of the Greek word for "first", πρῶτον. However, Rutherford also had in mind the word protyle as used by Prout. Rutherford spoke at the British Association for the Advancement of Science at its Cardiff meeting beginning 24 August 1920.[20] Rutherford was asked by Oliver Lodge for a new name for the positive hydrogen nucleus to avoid confusion with the neutral hydrogen atom. He initially suggested both proton and prouton (after Prout).[21] Rutherford later reported that the meeting had accepted his suggestion that the hydrogen nucleus be named the "proton", following Prout's word "protyle".[22] The first use of the word "proton" in the scientific literature appeared in 1920.[23]
Protons also occur in from extrasolar origin in space, from galactic cosmic rays, where they make up about 90% of the total particle flux. These protons often have higher energy than solar wind protons, but their intensity is far more uniform and less variable than protons coming from the Sun, the production of which is heavily affected by solar proton events such as coronal mass ejections.
Research has been performed on the dose-rate effects of protons, as typically found in space travel, on human health.[25][26] To be more specific, there are hopes to identify what specific chromosomes are damaged, and to define the damage, during cancer development from proton exposure.[25] Another study looks into determining "the effects of exposure to proton irradiation on neurochemical and behavioral endpoints, including dopaminergic functioning, amphetamine-induced conditioned taste aversion learning, and spatial learning and memory as measured by the Morris water maze.[26] Electrical charging of a spacecraft due to interplanetary proton bombardment has also been proposed for study.[27] There are many more studies that pertain to space travel, including galactic cosmic rays and their possible health effects, and solar proton event exposure.
See also[edit]
2. ^ a b W.N. Cottingham, D.A. Greenwood (1986). An Introduction to Nuclear Physics. Cambridge University Press. p. 19.
3. ^ R.K. Adair (1989). The Great Design: Particles, Fields, and Creation. Oxford University Press. p. 214.
5. ^ H. Nishino et al. (Kamiokande collaboration) (2009). "Search for Proton Decay via pe+ π0 and pμ+ π0 in a Large Water Cherenkov Detector". Physical Review Letters 102 (14): 141801. arXiv:0903.0676. Bibcode:2009PhRvL.102n1801N. doi:10.1103/PhysRevLett.102.141801.
6. ^ S.N. Ahmed et al. (SNO Collaboration) (2004). "Constraints on nucleon decay via invisible modes from the Sudbury Neutrino Observatory". Physical Review Letters 92 (10): 102004. arXiv:hep-ex/0310030. Bibcode:2004PhRvL..92j2004A. doi:10.1103/PhysRevLett.92.102004. PMID 15089201.
9. ^ See this news report and links
10. ^ a b S. Dürr, Z. Fodor, J. Frison, C. Hoelbling, R. Hoffmann, S. D. Katz, S. Krieg, T. Kurth, L. Lellouch, T. Lippert, K. K. Szabo, and G. Vulvert (21 November 2008). "Ab Initio Determination of Light Hadron Masses". Science 322 (5905): 1224–7. arXiv:0906.3599. Bibcode:2008Sci...322.1224D. doi:10.1126/science.1163233. PMID 19023076.
11. ^ C. F. Perdrisat, V. Punjabi, M. Vanderhaeghen (2007). "Nucleon Electromagnetic Form Factors". Prog Part Nucl Phys 59 (2): 694–764. arXiv:hep-ph/0612014. Bibcode:2007PrPNP..59..694P. doi:10.1016/j.ppnp.2007.05.001.
12. ^ Sigfrido Boffi & Barbara Pasquini (2007). "Generalized parton distributions and the structure of the nucleon". Rivista del Nuovo Cimento 30. arXiv:0711.2625. Bibcode:2007NCimR..30..387B. doi:10.1393/ncr/i2007-10025-7.
13. ^ Randolf Pohl, Aldo Antognini, François Nez, Fernando D. Amaro, François Biraben, João M. R. Cardoso, Daniel S. Covita, Andreas Dax, Satish Dhawan, Luis M. P. Fernandes, Adolf Giesen, Thomas Graf, Theodor W. Hänsch, Paul Indelicato, Lucile Julien, Cheng-Yang Kao, Paul Knowles, Eric-Olivier Le Bigot, Yi-Wei Liu, José A. M. Lopes, Livia Ludhova, Cristina M. B. Monteiro, Françoise Mulhauser, Tobias Nebel, Paul Rabinowitz, et al. (8 July 2010). "The size of the proton". Nature 466 (7303): 213–216. Bibcode:2010Natur.466..213P. doi:10.1038/nature09250. PMID 20613837. Retrieved 2010-07-09.
15. ^ New proton measurements may throw physics a curve
17. ^ Researchers Observes Unexpectedly Small Proton Radius in a Precision Experiment
19. ^ R.H. Petrucci, W.S. Harwood, and F.G. Herring (2002). General Chemistry (8th ed.). p. 41.
20. ^ See meeting report and announcement
21. ^ Romer A (1997). "Proton or prouton? Rutherford and the depths of the atom". Amer. J. Phys. 65 (8): 707. Bibcode:1997AmJPh..65..707R. doi:10.1119/1.18640.
22. ^ Rutherford reported acceptance by the British Association in a footnote to a 1921 paper by O. Masson in the Philosophical Magazine (O. Masson, Phil. Mag. 41, 281, 1921)
23. ^ Pais, Inward Bound, first edition, Oxford Press, 1986, page 296. Pais reported that he believed the first science literature use of the word proton occurs in the article Nature, 106: 357, 1920.
26. ^ a b B. Shukitt-Hale, A. Szprengiel, J. Pluhar, B.M. Rabin, and J.A. Joseph. "The effects of proton exposure on neurochemistry and behavior". Elsevier/COSPAR. Retrieved 2009-06-12.
27. ^ N.W. Green and A.R. Frederickson. "A Study of Spacecraft Charging due to Exposure to Interplanetary Protons". Jet Propulsion Laboratory. Retrieved 2009-06-12.
28. ^ H. Planel (2004). Space and life: an introduction to space biology and medicine. CRC Press. pp. 135–138. ISBN 0-415-31759-2.
29. ^ G. Gabrielse (2006). "Antiproton mass measurements". International Journal of Mass Spectrometry 251 (2–3): 273–280. Bibcode:2006IJMSp.251..273G. doi:10.1016/j.ijms.2006.02.013.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36450 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
The saltbox originated in New England, and is an example of American colonial architecture. One theory holds that the saltbox form was popularized by Queen Anne's taxation of houses greater than one story. Since the rear of the roof descended to the height of a single-story building, the structure was exempt from the tax.[1][2] More likely, though, the saltbox shape evolved organically from the need for additional space for growing families; adding a lean-to was an economical way to enlarge the house.
The earliest saltbox houses were created when a lean-to addition was added onto the rear of the original house extending the roof line sometimes to less than six feet from ground level. Old weathered clapboards are still in place on parts of the original rear exterior walls of some of the earliest New England saltbox houses (see images). The hand-riven oak clapboards on both the Comfort Starr House and Ephraim Hawley House are preserved in place in the attic that was created when the lean-to was added onto the original house. The style was popular for structures throughout the colonial period and into the early Republic, perhaps because of the simplicity of its design.
Ephraim Hawley House, Nichols, Connecticut original oak clapboards in leanto attic
Alternatively, Albion's Seed: Four British Folkways in America by David Hackett Fischer traces American Saltbox to East England areas of Kent & East Anglia from the early 1600s.[3]
Saltbox homes can also be found in parts of Newfoundland and Labrador.
Catslide roof Thomas Hawley House
Saltboxes, along with many other types of colonial houses, can be considered to be timber-frame houses. Timber framing, or post-and-beam construction, involves joining large pieces of wood with woodworking joints, such as mortise-and-tenon joints, or with wooden pegs, braces, or trusses. Metal nails were sparingly used, because of their expense. Timber frame construction was the construction method for all frame houses in 17th- and 18th-century America, where the abundance of wood made the timber frame house popular, until the advent of "balloon framing" in the early 1800s. The exterior of a saltbox was often finished with clapboard or other wooden siding. The Josiah Day House in West Springfield, Massachusetts is constructed of brick.[4]
See also[edit]
1. ^ New York Times (1900-12-22). "The Salt-Box House.; Books of the Season.". The New York Times. Retrieved 2008-04-27.
2. ^ "Tax Shelters: The Three-Storey Bungalow". Retrieved 2008-04-27.
3. ^ Albion's Seed: Four British Folkways in America, David Hackett Fischer
4. ^ Joshua Day House Museum website retrieved on 2009-07-19
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36451 | From Wikipedia, the free encyclopedia
(Redirected from Vrindaban)
Jump to: navigation, search
Brindavan, Brindaban, Brundavan, Vraj
Main gate of Banke Bihari temple, Vrindavan
Main gate of Banke Bihari temple, Vrindavan
Vrindavan is located in Uttar Pradesh
Location in Uttar Pradesh, India
Coordinates: 27°35′N 77°42′E / 27.58°N 77.7°E / 27.58; 77.7Coordinates: 27°35′N 77°42′E / 27.58°N 77.7°E / 27.58; 77.7
Country India
State Uttar Pradesh
District Mathura
Elevation 170 m (560 ft)
Population (2001)
• Total 56,618
• Official Hindi
Time zone IST (UTC+5:30)
PIN 281121
Vrindavan (About this sound pronunciation ) is a town in the Mathura district of Uttar Pradesh, India. It is the site of an ancient forest which is the region where, according to the Mahabharata, the deity Krishna spent his childhood days.
Kesi Ghat on the Yamuna river.
The ancient name of the city, Brindavana, comes from its groves of 'Brinda' Ocimum tenuiflorum (Holy Basil or tulasi) with vana (Sanskrit: वन) meaning a grove or a forest.[1] Two small groves still exist at Nidhivan and Seva Kunj.
It is believed that the essence of Vrindavan was lost over time until the 16th century, when it was rediscovered by Chaitanya Mahaprabhu. In the year 1515, Chaitanya Mahaprabhu visited Vrindavana, with purpose of locating the lost holy places associated with Lord Sri Krishna's transcendent pastimes. Chaitanya wandered through the different sacred forests of Vrindavana in a spiritual trance of divine love. It was believed that by His divine spiritual power, He was able locate all the important places of Krishna's pastimes in and around Vrindavana.[4]
Religious heritage[edit]
Madan Mohan temple
Sevakunja in Vrindavan.
ISKCON Krishna Balaram Temple at Vrindavan
According to tradition and recorded evidence,[citation needed] Krishna was raised in the cowherding village of Gokul by his foster parents Nanda Maharaj and Yasoda. The Bhagavata Purana describes Krishna's early childhood pastimes in the Vrindavan forest where he, his brother Balarama, and his cowherd friends stole butter, engaged in childhood pranks and fought with demons. Along with these activities, Krishna is also described as meeting and dancing with the local girls of Vrindavan village, especially Radharani, who were known as gopis. These pastimes were the source of inspiration for the famous Sanskrit poem, Gita Govinda, by the Sanskrit poet, Jayadeva (c. 1200 AD).
The most popular temples include:
Garud Govind Temple is located on the turn of NH-2 to Vrindavan in Chhatikara village. This temple is one of the most ancient temples of the Brij and according to purans, main idol was incarnated by great grandson of lord Krishna, shri Bajranabh ji after the order of his Kulguru shri Gargachary. This is also one of the rarest temples of Garud ji, which is famous for 'Kalsarp Anushthan'.
Banke Bihari Temple, built in 1862[6] is the most popular shrine at Vrindavan. The image of Banke-Bihari was discovered in Nidhi Vana by Swami Haridas, the great Krishna devotee, belonging to the Nimbarka sampradaya.
Radha Vallabh Temple, set up by the Radha-Vallabh sampradaya, through Sri Hith Harivansh Mahaprabhu,[7] has the crown of Radharani placed next to the Shri Krishna image in the sanctum.
Sri Radha Raman Mandir, constructed at the request of Gopala Bhatta Goswami around 1542 is one of the most exquisitely crafted and revered temples of Vrindavan, especially by the Goswamis. It still houses the original saligram deity of Krishna as Radha Ramana, alongside Radharani.[8]
Shahji Temple, another popular temple at Vrindavan, was designed and built in 1876 by a wealthy jeweller, Shah Kundan Lal of Lucknow. The deities (images) at the temple are popularly known as the Chhote Radha Raman. Noted for its magnificent architecture and beautiful marble sculpture, the temple has twelve spiral columns each 15 feet high. The 'Basanti Kamra' – the darbar hall is famed for its Belgian glass chandeliers and fine paintings.
Rangaji Temple, built in 1851 is dedicated to Lord Ranganatha or Rangaji depicted as Lord Vishnu in his sheshashayi pose, resting on the coils of the sacred Sesha Naga. The temple built in the Dravidian style (as a replica of Srivilliputhur) has a tall gopuram (gateway), of six storeys and a gold-plated Dhwaja stambha, 50 feet high. A water tank and a picturesque garden lie within the temple enclosure. The annual festival of Jal Vihar of the presiding deity is performed with great pomp and splendour at the tank. The temple is also famous for its 'Brahmotsdav' celebration in March–April, more popularly known as the 'Rath ka Mela'. The ten-day-long celebrations are marked by the pulling of the rath (the chariot car) by the devotees from the temple to the adjoining gardens. The prayers within the temple are performed, following in the style of Andal, one of the twelve Vaishnava Saints of South India.
Sri Krishna-Balarama Temple built by the International Society for Krishna Consciousness (ISKCON) in a location known as 'Raman-Reti', is one of the most beautiful temples in Vrindavan today. The principal deities of this temple are Krishna and Balaram, with Radha–Shyamasundar and Gaura-Nitai alongside. Adjoining the temple is the samadhi of A. C. Bhaktivedanta Swami Prabhupada, the founder of ISKCON, built in pure white marble.
Radha Damodar Mandir Located at Seva Kunj, the Mandir was established in 1542 by Srila Jiva Goswami. The deities Sri Sri Radha–Damodar are here. The bhajan kutir of A. C. Bhaktivedanta Swami Prabhupada is also situated at the Mandir.
Kathia Baba Ka Sthan at Gurukul Road, the mahanta of which is entitled as "brajobidehi mahanta" and the acharya of Swabhuram Dwara of Nimbarka sect, Sri Swami Rash Behari Das Kathia Babaji Maharaj.
Sri Sri Radha Govinda Temple[9] - was built by Mahamandaleshwar Mahant Sri Krsna Balaram Swamiji from Vrindavan. This newly constructed Radha Govinda Temple, completed in 2004 is based on a famous historic temple built about 500 years ago by Srila Rupa Goswami, a direct Sanyasi disciple of Sri Chaitanya Mahaprabhu.
Other sacred sites[edit]
Kusuma Sarovar bathing ghat, in the Goverdhan area
Other places of interest include Seva Kunj, Kesi Ghat, Sriji Temple, Jugal Kishore Temple, Lal Babu Temple, Raj Ghat, Kusuma Sarovar, Meera-Bai Temple, Imli Tal, Kaliya Ghat, Raman Reti, Varaha Ghat and Chira Ghat, and across the river, a short boat-ride away is the samadhi shrine of Devraha Baba, a revered saint of the last century.
The Seva Kunj is where Lord Krishna once performed the Raaslila with Radha-Rani and the gopis and Nidhi Van where the divine couple rested. The samadhi of Swami Haridas, the guru of Tansen, is situated here. Every year, in his honour, Swami Haridas Sammelan is organized, in which all renowned musicians of India take part. After hundreds of year a historic effort to restore the ancient Seva Kunj is being carried out by The Braj Foundation, a NGO committed for the all-round development of Braj.
The Bhuteshwar Mahadev Temple as a Shakti Peeth[edit]
Shiva carrying the corpse of Sati Devi
The shrine is believed to be a Shakti Peetha, the Ringlets of Hair of Sati Devi is believed to have fallen here. Shakti Peethas are believed to have been formed by the falling of the parts of the corpse of Sati Devi when Shiva carried it and wandered.[10][11][12][13]
Vrindavan is located at 27°35′N 77°42′E / 27.58°N 77.7°E / 27.58; 77.7.[14] It has an average elevation of 170 metres (557 feet).
As of 2001 India census,[15] Vrindavan had a population of 56,618. Males constitute 56% of the population and females 44%. Vrindavan has an average literacy rate of 65%, higher than the national average of 59.5
male literacy is 73%, and female literacy is 55%. In Vrindavan, 13% of the population is under 6 years of age. The number of females is 24,200 including 13% who are under 6 years of age.
Vrindavan is also known as the City of Widows[16] due to the large number of widows who move into the town and surrounding area after losing their husbands. According to some Hindu traditions, upper-caste widows may not remarry, so many of those abandoned by their families on the death of their husband make their way here. There are an estimated 15,000 to 20,000 widows living on the streets,[17][18] many of whom have spent over 30 years there. In exchange for singing bhajan hymns for 7–8 hours in bhajanashrams, women are given a cup of rice and a pittance of money (around Rs. 10),[16] which they try to supplement by begging on the streets. An organization called Guild of Service was formed to assist these deprived women and children.[18] In 2000 the organization opened Amar Bari (My Home), a refuge for 120 Vrindavan widows, and a second shelter for 500 widows is expected to open.
Maitri India www.maitriindia.org, a humanitarian NGO based in Delhi presently works with more than 500 widow mothers in shelter homes in Vrindavan.The widow mothers benefiting from this project receive a free daily midday meal to form a healthy and nourishing diet. Supplements are also provided to address the specific geriatric needs of widows. Widow mothers are also provided and facilitated with basic and specialized healthcare during regular multi-specialty health camps conducted through Maitri’s network of partners. Maitri facilitates cataract surgeries, cancer treatment and other care for serious diseases that require medical attention or hospitalization. Further more, Maitri works to ensure that the widows receive benefits from the government schemes such as pension of Rs. 300 per month, Swadhar Yojana under which they receive Rs 550 per month from the government for food, Aadhaar cards (Social Security number and card), Below Poverty Line ration cards etc. These cards and enrollment allow the widow mothers to access various government benefits including subsidized medical insurance, medical treatment, and rations.[19]
List of schools[edit]
Sanskrit Chhatravas (By Swami Banbari Lal Gaur ji)
Vedic Shiksha: A effort for the welfare of human being
Sandipani Muni School Primary and Secondary School
Shemford Futuristic Schools - Vrindavan
Parmeshwari Devi Dhanuka Saraswati Vidya Mandir
Vrindavan VidhyaPeeth Inter College
Porter Burchard Methodist English Medium School
Recently Vrindavan is becoming a major source of earnings for real estate companies. People from Delhi are purchasing houses in Vrindavan for its relative peace and quiet, and to live in a Holy place.[citation needed] As a result of this demand, many notable real estate and property development companies have launched many new housing projects in Vrindavan. This housing industry has caused major traffic congestion, noise pollution and wild life devastation.
See also[edit]
1. ^ Brindaban The Imperial Gazetteer of India, 1909, v. 9, p. 17.
3. ^ "Vrindavan PinCode". citypincode.in. Retrieved 2014-03-10.
4. ^ Discovery of Vrindavan by Chaitanya Mahaprabhu
5. ^ KLOSTERMAIER, Klaus K. (2007). A Survey of Hinduism. State University of New York Press; 3 edition. p. 204. ISBN 0-7914-7081-4. "The center of Krishna-worship has been for a long time Brajbhumi, the district of Mathura that embraces also Vrindavana, Govardhana, and Gokula, associated with Krishna from the time immemorial. Many millions of Krishna bhaktas visit these places every year and participate in the numerous festivals that re-enact divine scenes from Krishna's life on Earth."
6. ^ Banke-Bihari Temple website
7. ^ Radhavallabh Temple website
8. ^ The history of Sri Radha Raman Temple
9. ^ Red Stone Temple
10. ^ "Uma Shakti Peeth Vrindavan – 2nd Among 51 Shakti Peethas". Retrieved 4 August 2013.
14. ^ Falling Rain Genomics, Inc - Vrindavan
16. ^ a b "CNN: India's widows live out sentence of shame, poverty". Archived from the original on 29 November 2006. Retrieved 25 March 2007.
17. ^ "Catalyst Magazine: Moksha: the widows of Vrindavan". Retrieved 25 March 2007.
18. ^ a b "Shunned from society, widows flock to city to die". CNN. 5 July 2007. Retrieved 5 July 2007. (This article was criticized by several members of the South Asian Journalists Association for "generalizations and questionable assertions." An article in the SAJA Forum documents several instances where, after such criticisms appeared, CNN quietly made changes in the online version of the article. Arun Venugopal, a reporter for WNYC, wrote, "On the SAJA Discussion list, a number of people across the political spectrum found that the story ascribed too much to 'tradition' rather than to more complex social realities.")
19. ^ http://www.maitriindia.org/?p=91
• Keene, Henry George (1899, Sixth ed.). "Bindrabun". A Handbook for Visitors to Agra and Its Neighbourhood. Thacker, Spink & Co. pp. 98–106.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/36478 | We are the rising
by Johnny Dantonio
We are the rising!
We are the god damn solution!
Pop culture should've been watched over,
Our individuality knocked over, and now muffuckas around my way leanin' in,
crotched over.
Move over while I rise.
Step back as I get back to my two feet and brush off these tight ass jeans and this young ass t-shirt.
Get that bullshit off my unbrushed hair.
Them gazes don't mean shit to me.
Now either yell mutiny or call litany:
I am my own damn self.
I am the king of my peculiarity, singularity,
but innately.
It's easy to hate these fake seeds that pen their person from an indie rock album,
foreign film,
tumblr blog;
ironic facial hair,
chuck taylor cons;
see through stockings beneath cut jean shorts,
pierced everything,
Pitchfork discoursed,
political retorts,
robotic ones we are,
Your lack of athleticism doesn't mean you were picked on.
Your lack of a suit doesn't mean you grew up poor.
This form fitting is shitting on what we should be trying to form,
because the core of us is as original as its ever been before.
We just drape the shit with corduroys and hair dye and team badges,
we fly flags and spit gasoline then light matches,
screaming for the attention of some similar mad hatters,
who never understood that none of this had mattered.
Just because you're not corporate does not mean you're creative.
Just because you're not quiet does not mean you should say shit.
In fact, the fact is that it's all pretty basic
I'm sick of you headless muffuckas
searching for a facelift. |
global_01_local_0_shard_00000017_processed.jsonl/36485 | View Single Post
Old 09-16-2012, 05:03 AM #7
Zero. Oil. Leaks.
Solidjake's Avatar
Join Date: May 2008
Location: NYC
Posts: 21,699
My Ride: 2002 330i
Replace that cooling system since you're there and do the electrical fan swap that I have a thread on (all part numbers included)
I would also look into having the engine mounts checked out.
Solidjake is offline Reply With Quote |
global_01_local_0_shard_00000017_processed.jsonl/36488 | Naruto Shippuden
Naruto Discussion Forum
Go Back Naruto Discussion Forum > The Ramen Shop > Town Bookstore > Is number 45 out yet?
Thread: Is number 45 out yet? Send Page to a Friend
Your Username: Click here to log in
Random Question
Recipient Name:
Recipient Email Address:
Email Subject:
Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd. |
global_01_local_0_shard_00000017_processed.jsonl/36490 | Inventor General
New Member
Posts: 1
Registered: 11-22-2012
Message 1 of 1 (191 Views)
GBA SP project help
191 Views, 0 Replies
11-22-2012 05:48 AM
I'm a student engineering and I have an assignment to make an object which involves movement. I've chosen to make a gameboy advance SP, but I'm having some issues. I was wondering if you would be able to help me with certain aspects.
I'm having a lot of issues with constraining the Dpad. (You have to be able to press up/down + left/right at the same time, but without rotating around the axis). I made a sphere under the Dpad and removed a sphere in my base part. I added 2 angular constraints so now it kinda does what i want but not entirely. For the angles I have to constrain 176-180 with resting position at 178. I can't figure out how i can constrain 178-182° with 180 at resting position.
I also have no clue on how to stop it from rotating.
I've added my project as an attachment.
Thank you for your time
Please use plain text.
You are not logged in.
Need installation help?
Ask the Community |
global_01_local_0_shard_00000017_processed.jsonl/36491 | NotifyPropertyChanged VS DependencyObjects
Results 1 to 2 of 2
Thread: NotifyPropertyChanged VS DependencyObjects
Hybrid View
1. #1
Join Date
May 2000
Belgium, Bruges
NotifyPropertyChanged VS DependencyObjects
Hi, i'm a WPF newbie. I'm trying to learn it as a matter of fact :-)
If you have binding between a textbox.text and the name property of your employee class, then you have to add code if you want the textbox.text property to be updated when another process changes the name property. You can do this by letting the employee class implement the INotifyPropertyChanged and let the binded properties know Name has changed.
You can also do this by letting the Employee class inherit from DependencyObject. If you then use the SetValue in your Name property, you get the same effect as with notifypropertychanged.
Now my question: what is then the difference between the 2 (i know you have extra capabilities with DependencyProperties, zo when should you use notifyPropertyChanged?) Here i have the code that does 2 times the same, but in a different way:
class Employee : INotifyPropertyChanged
private string name;
public string Name
get { return name; }
set { = value;
this.NotifyPropertyChanged("Name");// Notify others }
#region INotifyPropertyChanged Members
public event PropertyChangedEventHandler PropertyChanged;
private void NotifyPropertyChanged(string name)
if (PropertyChanged != null)
PropertyChanged(this, new PropertyChangedEventArgs(name));
class Employee : DependencyObject
private string name;
public static readonly DependencyProperty NameProperty =
DependencyProperty.Register("Name", typeof(string), typeof(Employee));
public string Name
get { return (string) GetValue(NameProperty); }
set {
SetValue(NameProperty, value);
2. #2
Arjay's Avatar
Arjay is offline Moderator / MS MVP Power Poster
Join Date
Aug 2004
Re: NotifyPropertyChanged VS DependencyObjects
Take some metrics to be sure, but I'd be the 2nd approach has more overhead.
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts
Azure Activities Information Page
Windows Mobile Development Center
Click Here to Expand Forum to Full Width
HTML5 Development Center |
global_01_local_0_shard_00000017_processed.jsonl/36507 | Take the 2-minute tour ×
Developers are found on coding forums, artists are found on art forums, etc... but where to find someone who is good at making trailers? Is there some community of "trailer makers"? Should I look for someone in a game enthusiasts forum? Any hints where to look at? ...let me also mention that we have very low budget, and a volunteer would be even greater.
share|improve this question
Why dont you make it yourself o.o – Gustavo Maciel Jan 19 '12 at 11:48
because I probably suck at it and someone else would do a much better job ...and i'm already overrun by many other tasks – arnaud Jan 19 '12 at 12:01
If you can't afford to pay someone, you're better off doing it yourself. – thedaian Jan 19 '12 at 15:25
I stopped caring at "volunteer". – Lohoris Jan 20 '12 at 11:05
add comment
1 Answer
Are there any universities around your area? If so, consider hiring a student in an appropriate field. Many schools also have a classified ad site where you can post an offer.
Trailers are not very difficult to make, so not going with an established professional is a relatively small risk. These students will likely be looking to build a portfolio, so make sure you tell them that you're willing to recommend them if you're satisfied with the job.
Much of this will also depends on what, exactly, needs to be done. Do you already have the gameplay footage? Do you have the music? Is it just a matter of stitching clips together and adding music? Do you need a voiceover?
Being specific is helpful here. The absolute worst thing you can do is to just say "make a trailer for this game." Ideally, you already have a mental image of what the finished product looks like. Put these ideas down on paper in the form of a detailed descriptive document, complete with sketches.
share|improve this answer
+1 for "Being specific is helpful here". If you're not specific, you'll end up wasting your time and the time of the college student you're working with. – thedaian Jan 19 '12 at 18:35
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36508 | Pre-E3 06: Medieval II: Total War impressions
The Total War games have always been high on the list for strategy gamers due to their solid mix of strategic conquest, tactical combat, and staggering vastness. Literally hundreds of units can appear onscreen at once, each determined to run its sword or spear through someone else out there. Although the latest installment returns to an already visited era, the advances in gameplay and technology make it a trip that we're eagerly anticipating.
Visual upgrades shine on the field of battle, with an extreme level of detail in all the units. Rather than settle for a mass of identical warriors, the developers have created a number of small variations on the uniforms to give the illusion of a group of individual people. Environments have also been upgraded, with extremely realistic looking terrain that also demands tactical consideration. For example, heavy mud will slow down an army.
Unit types are also graced with special maneuvers that can be invaluable during battle. During the demo, we saw a group of archers plant large stakes in the ground at an angle to stave off a cavalry charge. Apparently, calvary would prefer not to find themselves thrown over the front of their now-skewered mounts. Each unique move is designed to counter a specific attack, so wily players can change the course of battle via key tactical decisions.
The glory of battle and bloodlust aside, one of the biggest advancements takes place away from the battlefield. In the prior games, diplomacy was rather basic and your adversaries never really drove a hard bargain. Now, they have memories and will remember if you treated them with respect the last time you had dealings, of if you tried to take advantage of them. As a result, trade deals take on a bit more importance.
Cities can now be specialized, with either a military or an economic focus. Cities with a military focus have fortified walls and can train new recruits faster, while economic hubs have the benefit of improving trade and increasing revenues for your empire. Choosing the proper balance will be tricky, as having a bunch of military bases won't do you much good if you're not earning any money.
You can also wield economic power as a weapon through careful use of your merchant units. Lay claim to natural resources to deny them to your opponents or eliminate your enemy's merchants to harm his trading power. Of course, if money won't do it there is always religion. Priests can be used to influence the opposing masses and get them to rebel. But be warned: the holy men can also turn against you if you're not careful, inciting a religious war.
Every game in the Total War series has been a solid improvement on the one before, and the trend shows no sign of stopping with Medieval II. If you've ever watched Braveheart or (you poor bastard) Troy and thought you'd like a piece of that battle, here's your chance.
May 9, 2006
We Recommend
Join the Discussion
Add a comment (HTML tags are not allowed.)
Characters remaining: 5000
Connect with Facebook
|
global_01_local_0_shard_00000017_processed.jsonl/36510 | Peggy Noonan At The New Yorker Festival: Kind Of EmbarrassingEarly Saturday morning I dragged myself to the New Yorker Festival in Midtown, to see media mensch Ken Auletta moderate a panel discussion with Times editor Bill Keller, Atlantic blogger Ta-Nehisi Coates, Slate press critic Jack Shafer, and breathless WSJ columnist Peggy Noonan, the token conservative. I'll leave out the boring recap parts and distill the experience down to its key point: Peggy Noonan should go back to writing political speeches, because—even taking into account the fact that she's a Republican hack—her dishonesty is embarrassing to watch. Ugh. Noonan, remember, was caught on a live mic talking about how the selection of Sarah Palin as VP was "bullshit." A fact that was referenced repeatedly by Ken Auletta! So what did Noonan spend the bulk of her time on the panel (subject: "Covering the Candidates") doing? Defending Sarah Palin. It was far too early to take notes, but I'll sum up Peggy's arguments: "Sarah Palin, fresh, new, American, real, six-pack, women, sexism?, the American people." The experience was strange because every single person sitting in the room—the panelists, the moderator, the audience, the security guards—was well aware how dumb Sarah Palin is. But there was Peggy, gamely searching for some all-American Reaganesque prose to elevate Palin into something legitimate. The panel was about the media, so the bold political hackery was jarring and out of place, like when those crazy Christians wave signs at the funerals of dead soldiers saying God killed them because of fags. There's a time and a place for your brand of lying, Peggy. It's on the weekend talk shows, after you sign on as a speechwriter for the sure-to-be successful Palin administration. There are lots of political hacks writing columns; but Noonan always wants to pop up as some sort of spokeswoman for Middle America, in the most patronizing way possible to actual Middle Americans. You failed at the New Yorker Festival, Peggy Noonan. The contrast between Noonan and the other panelists was what made the entire ordeal grimace-worthy. Bill Keller has more political pressure on him than almost anyone in the entire media. But when Ken Auletta asked him how it affected him when the McCain campaign charged the Times with being in the tank for Obama, Keller said (approximately): "It makes me want to find the toughest, hardest story about McCain we have and put it on the front page the next day." That's called honesty, Peggy Noonan. Retire with your trademark false grace. [Pic via Startraks] |
global_01_local_0_shard_00000017_processed.jsonl/36512 | John Mayer to Huffington Post: 'Go F—k Yourself'S
The story: This morning the HuffPo speculates that lover, crooner, fighter John Mayer might be getting back with Jennifer Aniston, based on things said at a concert. Mayer then responds, says everything's out of context, and invents exciting new phrases.
C-Span scar? What does that even mean? I'm sure it's something bad. I also like the idea of the Huffington Post as a single entity, fucking itself. How exactly does a blog fuck itself? What are the mechanics of that? Lifehacker? Can you explain this please?
Anyway, there you have it. John Mayer has finally defeated the Huffington Post. And the rest was silence.
Oh, except one last question. Why is John Mayer still on the internet?
[John Mayer's Tumblr, Image: Splash]
Click to view |
global_01_local_0_shard_00000017_processed.jsonl/36518 | iPhone 4 Cases Probably Won't Fit the iPhone 4SS
Though the iPhone 4 and iPhone 4S look the same, it seems like the AT&T iPhone 4 and the iPhone 4S are just different enough—the silent switch and volume up/down buttons are shifted ever so slightly—that your old cases won't fit.
The iPhone 4S button layout is a lot like the Verizon iPhone 4 (though we can't confirm if they're exactly the same) and those cases needed to accomodate for the button shift. There were cases that worked for both models, yes, but if you had an AT&T iPhone 4 and a case that didn't have an open gap for the iPhone's left side buttons, you'll proobaaably need to look for a new one. And here you thought Apple didn't change anything! [Android-Sale via UberGizmo] |
global_01_local_0_shard_00000017_processed.jsonl/36525 | Copyright (C) 2010 Dr. Alistair Ward
(at your option) any later version.
but WITHOUT ANY WARRANTY; without even the implied warranty of
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
{- |
[@AUTHOR@] Dr. Alistair Ward
[@DESCRIPTION@] A class to define the simple interface, to which data which can self-validation, should conform.
module ToolShed.SelfValidate(
-- * Type-classes
-- ** Functions
) where
import qualified Data.Array.IArray
import qualified Data.Map
import qualified Data.Set
-- | The interface to which data which can self-validate should conform.
class SelfValidator v where
getErrors :: v -> [String] -- ^ Return either null, or the reasons why the data is invalid.
isValid :: v -> Bool -- ^ The data which implements this interface should return 'True' if internally consistent.
isValid = null . getErrors --Default implementation.
instance (SelfValidator v) => SelfValidator (Maybe v) where
getErrors (Just v) = getErrors v
getErrors _ = []
instance (SelfValidator a, SelfValidator b) => SelfValidator (a, b) where
getErrors (a, b) = getErrors a ++ getErrors b
instance SelfValidator v => SelfValidator [v] where
getErrors = concatMap getErrors
instance SelfValidator v => SelfValidator (Data.Set.Set v) where
getErrors = Data.Set.fold ((++) . getErrors) []
instance SelfValidator v => SelfValidator (Data.Map.Map k v) where
getErrors = Data.Map.fold ((++) . getErrors) []
instance (Data.Array.IArray.Ix index, SelfValidator element) => SelfValidator (Data.Array.IArray.Array index element) where
getErrors = concatMap getErrors . Data.Array.IArray.elems
-- | Returns the first error only (so only call on failure of 'isValid'), since subsequent tests may be based on invalid data.
getFirstError :: SelfValidator v => v -> String
getFirstError selfValidator
| null errors = error "ToolShed.SelfValidate.getFirstError:\tzero errors ?!"
| otherwise = head errors
errors = getErrors selfValidator
-- | Filters failed tests amongst those specified.
extractErrors :: [(Bool, String)] -> [String]
extractErrors = map snd . filter fst |
global_01_local_0_shard_00000017_processed.jsonl/36565 | Windows Enterprise Desktop » Dell 968 AIO XPS versus Dell 968 AIO printer driver Fri, 14 Mar 2014 13:58:00 +0000 en-US hourly 1 Win7 Auto-detect Doesn’t Always Load the Right Drivers Tue, 27 Oct 2009 15:20:39 +0000 In switching my test and production PCs over from Vista (or creating dual boot Vista/Win7 or XP-SP3/Win7 setups), I’ve observed that while Windows 7 does a very good job of identifying most hardware and then loading the proper driver, I’ve also recently observed that its accuracy is less than perfect. This can lead to interesting problems and apparent stability issues, so it’s a possible culprit worth pondering when otherwise rock-solid Win7 installations start showing signs of driver-related instability.
Case in point: My Dell All-in-One (AIO) 968 inkjet printer. As I documented in a ViztaView blog a little over a year ago, that OS also misidentified this printer as a Dell AIO 968 XPS printer. XPS is the Microsoft XML Paper specification created as a platform independent document exchange format, and essentially forces the printer driver to convert all other print input forms into XPS prior to allowing the printer to output any files deposited into the AIO 968′s print queue. As it turns out, Win7 also falls prey to the same misidentification, which produces a slew of “Print Filter Pipeline Host” errors when the whatever-format-to-XPS conversion runs into trouble (which it does all the time, if my experience with this particular device misidentification is any guide). Thus, if you look at this Reliability Monitor display for 10/23/2009, you’ll see 6 instances of the “Print Filter Pipeline Host” “stopped working” errors on that day, as I printed a bunch of stuff (coloring pages for my son, actually).
Look at all the print filter pipeline errors!
Look at all the print filter pipeline errors!
When Dell released a new Windows 7 driver for this printer on October 5, I happily installed it and kept my nose to the grindstone without really checking my work. Had I done so, I would have noticed that the device had been incorrectly identified as a “Dell 968 AIO XPS Printer” rather than a “Dell 968 AIO Printer.” Because the former always invokes XPS conversion as part of the print process, and that process throws lots of errors — particularly when printing Web pages — I suddenly found myself back in the swamp with those “Print Filter Pipeline Host” errors once again.
It wasn’t until I went into Devices and Printers, right-clicked the Dell 968 entry and forced it to be identified as the right printer that I got things working. Simply uninstalling the driver and letting Win7 re-detect the hardware did no good whatsoever, because the OS misidentified this device as a “Dell 968 AIO XPS Printer” all over again, instead of the plain-vanilla version of the device. A quick manual override fixed this, and now things are working fine. (Hint: click the Set as default pop-up menu entry, and both printers will appear, so you can select which one to set as the default. That does the trick!)
All I need to do in future is to remember to make this manual change, if I ever need to re-detect that hardware in Windows 7 again. Just another little Windows eccentricity to add to my list of things to keep track of!
]]> 2 |
global_01_local_0_shard_00000017_processed.jsonl/36568 | Mining your information
Get more intelligence from your data using Cypher and Neo4j - UPDATED for Neo4j 2.0
Graphs are on the rise. From the Facebook Graph to the Google Knowledge Graph, large internet companies are taking advantage of graph queries to improve the value they can get from data they already have. Neo4j is one of the new breed of graph databases that allow for similar capabilities in companies that can't justify building their own graph persistence or querying implementation from scratch.
In this article, we'll look at Cypher - the language for querying and updating graphs in Neo4j. It's a declarative, SQL like language for simply specifying graph based queries.
This tutorial is designed for the newest version 2.0 of Neo4j, which was released in December 2013.
Getting started
Start by downloading the Neo4j file at
• On Windows: Run the installer and start the server with the Neo4j Desktop App.
• On Linux/Mac OS unzip the file and start from the directory bin/neo4j start (stop it again with bin/neo4j stop)
Open the Neo4j Browser on http://localhost:7474 and you should see the following welcome screen. Feel free to explore the guides that are available.
Figure 1: The Neo4j Browser
Graph basics
Before we can jump into Cypher, we need to cover just a couple of key points about graph databases. In a graph database, we persist information in labelled nodes and typed, directed relationships that connect them. Both nodes and relationships can have arbitrary properties (key: value pairs).
So for example, in Figure 1, nodes are used to represent movies (“Cloud Atlas” and “The Matrix” labelled “Movie”) and people (actors “Hugo Weaving” and “Tom Hanks” and director “Lana Wachowski” all labelled “Person”). Relationships are used to capture the fact that the actors have ACTED_IN the movies and the director has DIRECTED the movies. All of them have additional properties, e.g. the roles property on ACTED_IN.
Figure 2: The Movie Domain Model
Note that all relationships are directed. While you might be able to argue for a bidirectional relationship for concepts like friends, clearly it is not needed for modelling the domain. Only in domains where the direction is really relevant (e.g. twitter followship). In all other cases it is semantically equivalent as all relationships have a directionality, but they can be traversed either way. Whether I want to know all of the movies Tom Hanks has acted in or see all of the people who've worked at “Cloud Atlas” movie, I'm able to express and run both queries easily.
Also note that unlike a "relational" database where you'd probably add a many:many join table to capture the relationship between actors and movies, in Neo4j we can just add properties like the roles (characters) the actors have played right onto the relationship, making modelling both simpler and more natural.
Finally, notice that there is only an optional schema in Neo4j based on labels. Any node or relationship can have any properties. There might be unique constraints or indexes declared on certain labels and properties which are used for query optimization.
Figure 3: A graph to describe a graph
So a graph stores information in both nodes and relationships. Relationships are used to organize (and traverse) nodes, and both nodes and relationships can have any number of key:value properties.v
Importing Data
To import the movie dataset we’ll be working with we can just run :play movies in the command line which will bring up a larger import statement. Click on that to bring it into the editor and hit the run button on the right side.
After a few seconds it will have imported the data, the visualization shows a single node.
To see a bit more of the graph, open the “star” tab on the left and run the “Get some data” query.
Click on one movie node to bring up a pop up for styling the graph. On the right small tab you can select the color, size and property to show (“title”), do the same for the people nodes and choose their name as property to display.
Figure 4: The Browser Visualization and Styling
Understanding Cypher
Historically, writing graph traversals has been painful enough to persuade many developers to put up with the limitations of a relational store for information that's better fitted to a graph database. With Cypher, that has changed. While it takes a little while to become comfortable with the syntax of Cypher queries, it doesn't take long to understand the power of the language and to get used to writing queries.
Feel free to run the queries we discuss directly in the browser and look at the results.
At its heart, Cypher allows you to describe the patterns you want to look for in a graph. Let's say that you wanted to look for any two nodes which had a relationship between the first and second nodes. This is the Cypher query you'd write:
MATCH (a)-->(b)
RETURN a, b;
We’re describing a pattern in the MATCH clause, where the node we're starting on (a) has an outbound relationship to another node (b). As we want to return the information about both of the nodes and any properties that they might have we just RETURN a, b.
Naturally there are a lot of results as this is a pretty broad query (it finds all pairs of connected nodes). You see the visualization, and on the tabular view (right icon) you see the a rendering of the JSON representation for each row with the properties of the nodes.
Try the following query:
MATCH (a)-[r]->()
RETURN, type(r);
There are a number of differences in this query. Firstly, we don't care about what node we're connecting to, so we don't need to assign it a variable in the MATCH clause for referring to it in the RETURN clause.
Secondly, we're just displaying the name property of the first node rather than returning the entire node. Finally, we're using square braces to refer to the relationship and we're using a special "type()" function that allows us to know what *kind* of relationship connects the two nodes.
As an aside, there are only two absolute data integrity constraints in Cypher. Firstly, a relationship must always directionally connect two nodes (they can be the same node). Secondly, you must always give the relationship a type. The type can be anything you want, but whether it's a FRIEND, ROUTE, DEPARTMENT or YELLOW_ELEPHANT, you need to provide the type of a relationship when you create it.
Answering Real Questions
The queries above start to give us a sense of the syntax used by Cypher, but how about we look at some real queries to get a sense of how this works in practice?
Let's say we wanted to find all of the actors in our database and all of the movies they'd acted in. Try entering the following query and see what you get:
MATCH (a)-[r:ACTED_IN]->(m:Movie)
RETURN, r.roles, m.title;
What does this do? Well, we're still doing a full graph search - don't worry - we'll see later how to use bound nodes to run more performant, local queries. But now we're limiting the type of relationship to ACTED_IN, so we're not finding producers, directors or reviewers. Note that the movie node (m) is tagged with the label :Movie so that other engagements (e.g. tv-series) are not considered. Then we're returning the name of the actor, a collection of the roles they played in the movie and the title of the movie, so we get to see all of the actors, roles and movies in the database.
One of the types supported by Neo4j for properties is "array", so that's how we're getting an arbitrary set of roles. Another approach would have been to create one ACTED_IN relationship for each role an actor played in each movie, but in this case we're putting all the roles into a single relationship to show that property values in Neo4j are not just limited to numbers and strings.
So, we just wrote a query to find out all of the movie titles and roles that each actor has been associated to. If directors have a relationship with movies of type DIRECTED, what do you think the query would be to show all of the actors’ names, movie titles and directors’ names for every actor/director/movie combination in the database? Take a moment, have a go in the query console and see what you get.
Did you get it working? Here's a query that would do what we wanted:
MATCH (a)-[:ACTED_IN]->(m)<-[:DIRECTED]-(d)
RETURN, m.title,;
So we're still using a full graph search to start on every single node in the graph. We’re trying to match a more complex pattern where an actor has an ACTED_IN relationship with a movie AND where the movie has a DIRECTED relationship from a director. For example, if a movie didn't have a director it wouldn't be a match, and if an actor acted in a movie with two directors, there would be two records - one for the actor, the movie and the first director and another for the actor, the movie and the second director. In the last line we're deciding what information to include in the result set. In this case it's the name of the actor, the title of the movie, and the name of the director. Run the query (if you didn't already) and have a look at what you get.
Let's say you wanted to find all of the actors who directed the movie they acted in. What change would you make to the query? Give it a try and see what happens.
Here's a solution:
MATCH (a:Person)-[:ACTED_IN]->(m)<-[:DIRECTED]-(a)
RETURN, m.title;
We want to say that whoever ACTED_IN the movie, i.e. person (a) also DIRECTED the movie. By putting the same variable name for the far end of the DIRECTED relationship, what we're saying is that the same person must both have acted in and directed that same movie to match the pattern and be included in the record set. I also removed the from the RETURN clause as it wouldn't be a valid reference as there is no "d" in the query any more. Run the query and you'll see it returns a lot less results.
Starting Somewhere
Sometimes you'll want to run a full graph search for use cases like graph wide migrations or exporting all of your data, but most of your queries are likely to be much more constrained. In the case of the movie database, maybe we want to see all of the movies that Tom Hanks has acted in (within the data set). To do that, we need to constrain the property on the actor bind an actor node.
MATCH (tom:Person)-[:ACTED_IN]->(movie)
WHERE = "Tom Hanks"
RETURN movie.title;
In a production environment, you'd create indexes for looking up a nodes by their key properties. Eg. user by their email address or a product by its inventory number, we’re creating one index and one constraint for our dataset. With those in place the bound queries are sped up and uniqueness is guaranteed for movies by title (might not reflect reality).
CREATE INDEX ON :Person(name);
CREATE CONSTRAINT ON (m:Movie) ASSERT m.title IS unique;
So if you now run the same query again, it will use the index on :Person(name) to quickly look up the starting point and only traverse in the local neighbourhood. There is also a shortcut notation for these lookups without a WHERE clause.
MATCH (tom:Person {name:"Tom Hanks"})-[:ACTED_IN]->(movie)
RETURN movie.title;
More Complex Queries
There are lots of other things that can be done in Cypher. Aggregate functions allow you to return distinct records, a sum, average, min, max, count or even a collect (which aggregates values into an array or list). For example:
MATCH (a)-[:ACTED_IN]->(m:Movie)<-[:DIRECTED]-(d)
RETURN,, collect(m.title);
This query returns every pair of actors and directors who worked together on a movie and for each pair it returns an array containing all of the titles of the movies that they worked together on.
Figure 5: Tabular Results from a Cypher Query
We can also constrain queries. For example, we can constrain a query by a property of a node or relationship. For example:
MATCH (tom {name:"Tom Hanks"})-[:ACTED_IN]->(movie)
WHERE movie.released < 1992
RETURN movie.title;
This returns all of the titles of the movies that Tom Hanks acted in that were released before 1992. We can also constrain based on comparisons. An example would be:
MATCH (tom {name:"Tom Hanks"})-[:ACTED_IN]->(movie)<-[:ACTED_IN]-(a)
WHERE a.born < tom.born
This returns the names of all of the actor colleagues older than Tom Hanks who have acted in at least one movie with him.
It's even possible to constrain based on patterns. For example:
MATCH (gene {name:"Gene Hackman"})-[:ACTED_IN]->(movie)<-[:ACTED_IN]-(n)
This query returns the names of all of the people who have acted in at least one movie with Gene Hackman but who have also directed at least one movie. Hint. It’s “Clint Eastwood”
We've barely scratched the surface of Cypher, but hopefully you're starting to see just how powerful it can be for writing sophisticated graph queries. Cypher also allows you to create and update data in the graph, which we haven’t covered here.
If you'd like to find out more, head on over to where there are a range of resources for learning more about implementing graph solutions using Neo4j.
This article covers the first part of the Neo4j online course. For the graph epiphany, read the comprehensive Graph Databases book by Jim Webber and Ian Robinson, which is also available as a free PDF on And last but not least check out how other companies are using Neo4j to create innovative systems.
Peter Bell
CTO/Founder of Speak Geek
Peter is a contract member of the Github training team, and provides enterprise corporate training on a range of NoSQL data stores including Neo4j, as well as lean startup/product and mobile training and consulting to enterprises. He's also the CTO and founder of Speak Geek, which trains business people to more effectively hire and manage development teams.
Updated to Neo4j 2.0 by Michael Hunger
Peter Bell & Michael Hunger
What do you think?
Latest opinions |
global_01_local_0_shard_00000017_processed.jsonl/36571 | I Scream, You ScreamIn PETA's ongoing quest to alienate as many people from their message as possible, they're now taking on ice cream. Specifically, they want Ben and Jerry's to discontinue the use of cow's milk and use - wait for it - human breast milk. PETA's rationale is that some restauranteur in Switzerland is using breast milk in his food and it's nicer to cows. Apparently no consideration is given to the lactating women who would need to be "milked" to make a single pint of Cherry Garcia, but whatevs. B&J are characteristically laid-back about it, saying, "We applaud PETA's novel approach to bringing attention to an issue, but we believe a mother's milk is best used for her child." [WPTZ] |
global_01_local_0_shard_00000017_processed.jsonl/36585 | Take the 2-minute tour ×
The mitzvah of tziztit does not apply at night, so when we wear a talis all of davening on Yom Kippur, starting this year on Friday night for Maariv, do we make a bracha when we put the talis on?
Is it better to put it on closer to mincha time to avoid any such issues?
share|improve this question
add comment
1 Answer
up vote 4 down vote accepted
Mishna B'rura 619:4 says to put on the talis during the day so as to be able to say the b'racha on it; one does not, he says, say the b'racha on it if putting it on at night. That's the way I read it; CYLOR for practical matters.
share|improve this answer
That's about what I figured. Thanks! – geoffc Oct 7 '11 at 13:54
And asking reminded me to go find my kittel, glad I looked, since my wife had moved it somewhere only she knows about. :) – geoffc Oct 7 '11 at 19:24
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36602 |
Re: comment on the syntax document: discrepancies between tests and the latest version...
From: Ivan Herman <[email protected]>
Date: Thu, 31 Jan 2008 13:08:44 +0100
Message-ID: <[email protected]>
To: Mark Birbeck <[email protected]>
Mark Birbeck wrote:
> Hi Ivan,
>> I try to run my newest version of tests against crazy ivan, and I get
>> four failed tests. As far as I can see, all four are based on some
>> discrepancies between the syntax document and the test suite (or I
>> misunderstood something).
> Good tests...thanks.
The merit is Michael's, not mine!
I have update my test implementation[1], and now it passes all tests on
crazy ivan except for #34 and #38 which should then be updated...
I will move this test implementation to its final, 'official' place when
the syntax document is published...
Thanks Mark
[1] http://www.ivan-herman.net/cgi-bin/Tests/testRDFa.py?uri=
Ivan Herman, W3C Semantic Web Activity Lead
PGP Key: http://www.ivan-herman.net/pgpkey.html
FOAF: http://www.ivan-herman.net/foaf.rdf
Received on Thursday, 31 January 2008 12:08:48 GMT
This archive was generated by hypermail 2.2.0+W3C-0.50 : Thursday, 31 January 2008 12:08:50 GMT |
global_01_local_0_shard_00000017_processed.jsonl/36604 |
RE: forms and TAB query
From: Quinn, Anthony <[email protected]>
Date: Fri, 8 Nov 2002 09:22:25 +1100
Message-ID: <E04829959D1DD511ABEE0000C54F1ECB90942A@mailman.accessonline.com.au>
Hi Tom,
Yes - it's a problem with the event handler. Mind you, the real problem is
in the design of the page, which doesn't actually require a text field to
communicate the information on the page.
Either way, it's an easy one to fix - thanks for your help.
-----Original Message-----
From: Tom Gilder [mailto:[email protected]]
Sent: Tuesday, November 05, 2002 3:55 AM
To: [email protected]
Subject: Re: forms and TAB query
On Monday, November 4, 2002, 12:45:45 AM, Quinn, Anthony wrote:
> point. The cursor gets stuck in a form field. Can't quite figure out what
> the problem might be. Any thoughts?
The most likely cause is some script trying to change the focus, look
for things like onblur="this.focus()". You could also try disabling
script and trying to tab again, to see it definitely is that.
Tom Gilder
Received on Thursday, 7 November 2002 17:22:39 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/36605 |
Element.removeAttribute() with a non-existent attribute name
From: David Flanagan <[email protected]>
Date: Thu, 26 Jul 2001 16:00:44 -0700
Message-Id: <[email protected]>
To: [email protected]
Cc: [email protected]
Neither the Level 2 DOM specification, nor the errata of that
specification seem to specify what should happen if you call
Element.removeAttribute() and pass the name of a non-existent attribute.
Since the spec does not say that an exception is thrown in this case,
I'd assume that the call is simply ignored. On the other hand,
removeAttributeNode() throws an exception if the specified Attr node is
not found, and I wan't to be sure that removeAttribute() was not
intended to do the same thing.
Can anyone confirm that my assumption (i.e. ignore non-existent
attributes) is correct?
Finally, I'd be more comfortable with the spec. if this were formally
clarified for removeAttribute() and removeAttributeNS() in an erratum.
David Flanagan
Received on Thursday, 26 July 2001 19:55:51 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/36606 |
RE: Think Piece: Key Free Trust in the Semantic Web
From: Graham Klyne <[email protected]>
Date: Wed, 03 Apr 2002 20:18:10 +0100
Message-Id: <>
To: "Jeremy Carroll" <[email protected]>
Hi Jeremy,
I, too, found Joseph's paper interesting. Taking your point about keys: I
find that cryptosystems (possibly including PKI) are a useful way of
_transferring_ or _conveying_ trust (under certain assumptions), but are
singularly unhelpful for _establishing_ trust.
On the matter of _what_ is signed, I have for some time felt that signing
an RDF graph is a fairly meaningless, or at least not very helpful,
concept. Signing an particular representation (serialization) of a graph
seems to me to be enough to convey some notion of trust in the statements
of the graph thus represented. In real-world signatures, it isn't the
words in a contract that we sign, but (typically) a particular paper-based
rendering -- I would apply the same principles to bit-based
renderings. (For me, basing security on C14N is rather suspect, because
C14N seems to be such a difficult target to pin down -- the fact that it
may be possible for digital representations doesn't necessarily make it a
good approach.)
At 02:35 PM 4/3/02 +0100, Jeremy Carroll wrote:
>Hi Joseph,
>I had a quick look through your paper and found some of it convincing, and
>other bits less so.
> Preponderance Based Trust
> compelling - and the crucial contribution of the paper IMO.
> Key Free Trust in the Semantic Web
> I think this is mistitled.
> Aren't you really talking about the absense of a Public Key
>Infrastructure ...
>the traditional PKIs are replaced by a preponderance mechanism.
> Revocation
> one of the least convincing parts of the paper
> "However, there are possible solutions" hmmm
>Another issue is to do with quite what is being signed or digested.
>Your work on XML C14N has permitted digital signatures and digests of XML
>(anonymous) nodes then we have difficulties.
>For an RDF graph currently has no canonical serialization. When considering
>blank nodes, the RDF graph canonicalisation problem appears to be Graph
>Isomorphism complete and is hence much harder than the XML canonicalization
>(See my
>for discussion about relationship between the graph isomorphism problem and
>RDF graphs.
>See my
>for discussion about serializing an RDF graph).
>Hope this helps a promising line of enquiry.
Graham Klyne
Received on Wednesday, 3 April 2002 14:20:43 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/36607 |
Re: [Suggestion] Wrong environment variable specified when validating ($_SERVER['http-accept])
From: Andreas Prilop <[email protected]>
Date: Mon, 5 Nov 2007 18:54:31 +0100 (MET)
To: [email protected]
cc: David Coll <[email protected]>
Message-ID: <[email protected]>
On Mon, 5 Nov 2007, David Coll wrote:
> And that the validator should specify it's accepted Mime-type(s)
> to be more accurate,
I don't see why. It should likewise not specify any Accept-Language header.
You want to send something to the validator and something different
to the browser. I call this fraud.
It is like sending a valid document to the validator but sending
an invalid document to the browser - yet claiming "Valid XHTML".
Received on Monday, 5 November 2007 17:55:00 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/36611 |
Messages in this thread
On Tue, 2009-12-08 at 21:23 +0900, Tejun Heo wrote:
> On 12/08/2009 09:10 PM, Peter Zijlstra wrote:
> > Hotplug and deterministic are not to be used in the same sentence, its
> > an utter slow path and I'd much rather have simple code than clever code
> > there -- there's been way too many 'interesting' hotplug problems.
> Slow and indeterminism comes in different magnitudes.
Determinism does _not_ come in magnitudes, its a very binary property,
either it is or it is not.
As to the order of slowness for unplug, that is about maximal, its _the_
slowest path in the whole kernel.
> > Furthermore if it's objective is to cater to generic thread pools then I
> > think its an utter fail simply because it mandates strict cpu affinity,
> > that basically requires you to write a work scheduler to balance work
> > load etc.. Much easier is a simple unbounded thread pool that gets
> > balanced by the regular scheduler.
> The observation was that for most long running async jobs, most time
> is spent sleeping instead of burning cpu cycles and long running ones
> are relatively few compared to short ones so the strict affinity would
> be more helpful. That is the basis of whole design and why it has
> scheduler callbacks to regulate concurrency instead of creating a
> bunch of active workers and letting the scheduler take care of it.
> Works wouldn't be competing for cpu cycles.
> In short, the target workload is the current short works + long
> running mostly sleeping async works, which cover most of worker pools
> we have in kernel.
Ok, maybe, but that is not what I would call a generic thread pool.
So the reason we have tons of idle workqueues around are purely because
of deadlock scenarios? Or is there other crap about?
So why not start simple and only have one thread per cpu (lets call it
events/#) and run all works there. Then when you enqueue a work and
events/# is already busy with a work from anther wq, hand the work to a
global event thread which will spawn a special single shot kthread for
it, with a second exception for those reclaim wq's, for which you'll
have this rescue thread which you'll bind to the right cpu for that
That should get rid of all these gazillion threads we have, preserve the
queue property and not be as invasive as your current thing.
If they're really as idle as reported you'll never need the fork-fest
you currently propose, simply because there's not enough work.
So basically, have events/# service the first non-empty cwq, when
there's more non empty cwqs spawn them single shot threads, or use a
rescue thread.
> I thought about adding an unbound pool of workers
> for cpu intensive works for completeness but I really couldn't find
> much use for that. If enough number of users would need something
> like that, we can add an anonymous pool but for now I really don't see
> the need to worry about that.
And I though I'd heard multiple parties express interesting in exactly
that, btrfs, bdi and pohmelfs come to mind, also crypto looks like one
that could actually do some work.
\ /
Last update: 2009-12-08 14:39 [from the cache]
©2003-2011 Jasper Spaans |
global_01_local_0_shard_00000017_processed.jsonl/36636 | Subject: Re: The Further Adventures of NetBSD vs. Virtual PC 1.0
To: Chris G. Demetriou <>
From: Curt Sampson <>
List: current-users
Date: 07/20/1997 14:58:40
On Fri, 18 Jul 1997, Chris G. Demetriou wrote:
> If anybody reading this is actually experiencing the problem, by all
> means speak up!
I experienced the problem with my ASUS 486 SP3 motherboard (SIS
chipset, as I recall). I belive it appeared between 1.0 and 1.1.
However, I don't have the motherboard any more (I replaced it with
an SP3G, which has a different chipset), so I can't test for the
problem, unfortunately.
Curt Sampson Info at |
global_01_local_0_shard_00000017_processed.jsonl/36640 | Subject: Re: ssp and gcc-4.1
To: None <>
From: Jason Thorpe <>
List: tech-kern
Date: 11/07/2006 10:19:14
On Nov 7, 2006, at 10:16 AM, Thor Lancelot Simon wrote:
>> after all, the compiler provides both, right?
> know
> the maximum stack size before entry to each new function (creation of
> As Christos pointed out to me elsewhere, we can't really provide an
> interface by which alloca() can move the canary and inform the parent,
> because exploit code could use that interface, too. :-/
Uh, even without an interface to do it, exploit code could certainly
move the canary anyway, right?
-- thorpej |
global_01_local_0_shard_00000017_processed.jsonl/36641 | Subject: Re: dealing with pkgname-latest.tar.gz
To: Hubert Feyrer <>
From: Chris Jones <>
List: tech-pkg
Date: 05/24/2001 13:19:05
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Thu, May 24, 2001 at 08:46:41PM +0200, Hubert Feyrer wrote:
> On Thu, 24 May 2001, Chris Jones wrote:
> > I know that distfiles are typically mirrored on, so am
> > I worrying too much about this?
> You aren't, filenames like that are a general problem.
> I think the right solution was to copy it as jde-YYYYMMDD.tgz to
>, then use (only) that as master site.
In this case, they actually use version numbers -- they just don't use
a version number for the latest version. I think I'll list the real
master site second, after
> (Sounds like a question for the FAQ... :)
That was a hint, wasn't it? :) It kind of looks like we need another
FAQ, though. We currently have a user's guide, and a committer's
guide, but no maintainer's guide. There is, of course, the *huge*
Packages.txt file in the pkgsrc directory, but there's nothing (that I
can find) on the web site.
Chris Jones Mad scientist at large
Content-Type: application/pgp-signature
Content-Disposition: inline
Version: GnuPG v1.0.4 (NetBSD)
Comment: For info see |
global_01_local_0_shard_00000017_processed.jsonl/36646 | Subject: Re: rc.d: client-server dependencies
To: Mike M. Volokhov <>
From: John Nemeth <>
List: tech-userlevel
Date: 08/15/2006 04:12:48
On Jan 5, 5:34am, "Mike M. Volokhov" wrote:
} Geert Hendrickx <> wrote:
} >
} > I'm playing around with sysutils/ups-nut, a collection of networked UPS
} > tools. There's a client upsmon which connects to a server upsd, either
} > locally or over the network. The rc.d script for upsmon has:
} >
} > # PROVIDE: upsmon
} > # REQUIRE: upsd
} >
} > As a consequence, when running "/etc/rc.d/upsmon start" on a client-only
} > machine (where upsd runs on a different machine), it says:
} >
} > WARNING: $upsmon is not set properly - see rc.conf(5).
/etc/rc.d/upsmon. This way you can run upsmon without upsd, but if you
do use upsd, you are guaranteed that it will start before upsmon.
} There is another problem with such setup - rcorder(8) will not find upsd
} via dependency list (real message may be different):
} rcorder: requirement `upsd' in file `upsmon' has no providers.
} To solve this you need fake upsd script, or implemented optional dependency,
} like in bin/25785.
The ups-nut package can be fixed as above.
As for the PR, since you're a developer now, why don't you commit
the patch? If you don't feel comfortable doing it, ask your sponsor or
lukem for advice.
}-- End of excerpt from "Mike M. Volokhov" |
global_01_local_0_shard_00000017_processed.jsonl/36649 | FileMobile - PhotoBucket Meets YouTube
PayPerPost Bribes Bloggers for Positive Posts
PayPerPost is a great new way to lose your credibility as a blogger - the service will pay you to write reviews of new products and services. Advertisers post "opportunities" on the site - they can specify whether the post should have pictures, and even request a positive review. That last part really crosses the line, and it's sure to destroy any credibility you have as a writer.
Google Video
Finally, Google Video is getting with the program. Yesterday, the team rolled out some much-needed social features that will almost bring the service up to par with YouTube. If you visit any video page, you'll now see options to rate, comment and "label" (tag) videos down the right hand side. There's also a new "Share this Video" link that makes it easier to post videos directly to Blogger, TypePad, LiveJournal and - most importantly - MySpace.
iBloks - Why?
|
global_01_local_0_shard_00000017_processed.jsonl/36654 | Take the 2-minute tour ×
I know that 2 is a residue of primes of the form $8n+1$ and $8n+7$ and so on. I want to find a purely group theoretic or field theoretic proof of these statements.
For example, for 8n+1, the multiplicative group is of the order of 8 and so there exists an element of order 8, j. Then $(j + 1/j)^2 = 2$. Similarly for $8n+5$, there is an element of order 4, $i$ and if 2 had a residue, we could construct j such that $j^2 = i$ and therefore there is an element of order 8 which is impossible.
What I am not getting stuck on is finding something that differentiates a field of the order $8n+7$ from something of the form $8n+3$. This is how I proved the last 2 cases(there either exists or does not exist something of order 8).
share|improve this question
Is that a homework? – Mark Sapir May 31 '13 at 7:38
Voted to close. – Mark Sapir May 31 '13 at 8:59
The title asks about $-2$, the body doesn't. Anyway, voting to migrate to m.se – Gerry Myerson Jul 19 '13 at 0:26
add comment
migrated from mathoverflow.net Jul 19 '13 at 2:25
This question came from our site for professional mathematicians.
1 Answer
I'm not sure that this is what you want, but I'll try anyway.
If $p$ is an odd prime, then $8\mid p^2-1$, so when $p\not\equiv1\pmod8$ we have the element $j$ in the extension field $\mathbb{F}_{p^2}$. The zeros of the eighth cyclotomic polynomial are $$ \phi_8(x)=x^4+1=(x-j)(x-j^3)(x-j^5)(x-j^7)=(x-j)(x-j^3)(x+j)(x+j^3). $$
We can say something extra about the minimal polynomial of $j$ over the prime field in these cases. This is because by the Galois theory of finite fields the other zero is the Frobenius conjugate $j^p$. So if $p\equiv 3\pmod 8$, then the minimal polynomial of $j$ is $$m(x)=(x-j)(x-j^3)=x^2-ax-j^4=x^2-ax-1.$$ The other factor of $\phi_8(x)$ modulo $p$ is then $m(-x)=x^2+ax+1$. Vanishing of the quadratic term $-2-a^2$ of $m(x)m(-x)$ implies that $a^2=-2$. But here $a=j+j^3=j-1/j$, so in this case you have $(j-1/j)^2=-2$.
On the other hand, if $p\equiv7\pmod8$, then $$m(x)=(x-j)(x-j^p)=(x-j)(x-j^7)=x^2+bx+j^8=x^2+bx+1.$$ Again the other factor is $m(-x)$, and we similarly see that $b^2=2$. This time you get $b=(j+j^7)=(j+1/j)$, and $(j+1/j)^2=2$.
Note that in both cases $j\pm 1/j$ is the trace of $j$, so an element of the prime field.
share|improve this answer
I agree that this might fit Math.SE better. – Jyrki Lahtonen Jul 18 '13 at 13:14
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36655 | Take the 2-minute tour ×
For a long time now I've had trouble printing Mathematica files. While the .nb itself displays just fine on my screen, the kerning is awful when printed.
enter image description here
enter image description here
And in case you thought that's not too bad, here's a picture of a longer passage:
enter image description here
• The stylesheet I use is just a slightly modified version of the default stylesheet (which experiences the same problems)
• If it's any help, I'm on Mathematica, Ubuntu 11.04.
• Code sections are printed correctly! The error occurs for pretty much everything else, including plot labels, ...
• If you want to see the horror for yourself, I've uploaded a nb (using the default stylesheet) and a few prints: [tgz] [zip]
share|improve this question
Have you tried exporting (Saving As from the File manu) to PDF? It gives fine results here. – Szabolcs Jan 26 '12 at 16:42
Yes, I tried that. (And two different PDF printers.) – David Jan 26 '12 at 16:44
So your screenshot is of a PDF saved (not printed) from Mathematica, and displays like this regardless of the PDF viewer used? It's probably Linux specific then. Since we can't seem to reproduce the problem, can you upload a sample input notebook and the output PDF you get, and link to them? – Szabolcs Jan 26 '12 at 17:02
It prints fine my machine, Mma 8.0.4, Ubunto 11.10. So it is either in your Mma global configuration (not distributed with the nb) or in your printing setup... Try backing up your $BaseDirectory and $UserBaseDirectory then making a clean start. – Simon Jan 26 '12 at 22:53
I can reproduce the problem on Ubuntu 11.10 when doing File -> Save As ... -> PDF. Mma 8.0.1. Which version do you have, David? Simon says it works in 8.0.4. – Szabolcs Jan 27 '12 at 13:01
show 1 more comment
4 Answers
First, I cannot reproduce your issue on Mathematica on 64-bit Linux (CentOS 5.8). But I compare what you obtain and what I see, and I think I have an idea.
1. The notebook does not specifically require fonts, and as such, the font for e.g. your title cell is system-dependent. On my Mac, it uses a bold Helvetica in size 36, while on my Linux box it substitutes it by a Nimbus Sans L. As the latter is a free Helvetica substitute, it works fine even though it does not strictly have the same metrics. When exported to PDF, the font used is "Helvetica-Bold", which is not embedded because it's a standard PDF font.
2. In your case, the display font substitution is what is going wrong. Compare your display (top) and print (bottom) versions:
enter image description here
enter image description here
You can see the display font is not a good substitute for Helvetica: the characters are different (see the endings of the s and a) and it's definitely wider. I suspect this difference in metrics is where the awful character positioning is coming from.
3. So, why is your display font not Helvetica or a substitute? If you have a decent substitute installed, I don't know why Mathematica isn't using it, but font handling in X11 is a hairy topic. Maybe you'll get better results at debugging this on AskUbuntu.
4. And what can you do to fix it? Well, if it's a problem of fonts missing from you system, try installing Freefont if you haven't already (package ttf-freefont), or MS Core fonts (package ttf-mscorefonts-installer). If it's an X11 issue, then I'm afraid I can't help more…
Edit. I actually have another suggestion for a workaround: have you tried other fonts on your system (non-default fonts) to see if it works better?
share|improve this answer
add comment
Please try setting menu File > Print Settings > Printing Environment to Working and report if the behavior changes at all.
Please also try each of these settings and report any effect:
PrivateFontOptions -> {"WindowsUseTrueTypeNames" -> False}]
FontProperties -> {"FontMonospaced" -> False}]
share|improve this answer
Thanks, but nothing changed; the letter distances are still wrong. (Even in the same places, i.e. the "wrongness" is identical. The general font size and coloring changed as expected for the working print environment.) – David Jan 26 '12 at 17:00
add comment
It looks like something screwy on your system rather than anything specific to your notebook or stylesheet (I downloaded and everything was fine on my Mac). You could try explicitly setting the FontTracking at various levels, Global, Notebook, Cell etc. and see if that helps.
SetOptions[EvaluationNotebook[], FontTracking -> "Condensed"]
SetOptions[EvaluationNotebook[], FontTracking -> "Compressed"]
etc. If you find something that works then add it to your Printout style.
share|improve this answer
That moved the letters closer together at least, but the spacing is still very irregular (i.e. seemingly random letter spacing changes inside words). :-( – David Jan 27 '12 at 17:20
add comment
up vote 1 down vote accepted
Mathematica 9 came out last week, and the problem is less bad (but not gone) in the default stylesheet. As a solution to the initial problem it's not very satisfying, but in practical terms I got a stochastic differential equation solver as a bonus feature to being able to generate half-decent prints. I'll update this answer in case I find out more.
(Thanks again for the answers though.)
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36656 | Take the 2-minute tour ×
Sphere bundles and bundles over spheres are everywhere and are excellent things to get one's hands dirty with.
(1a) But when can we have a bundle $S^n \to S^m \to B?$ It seems like requiring the total space of a sphere bundle to be a sphere is pretty restrictive.
(1b) Does the answer to (1a) depend on a choice of category (PL, TOP, etc)?
There's an $S^1-$ bundle over $CP^1$ with total space $S^3$, but that's the only example I can find.
(2) Do people know examples other than the one above?
share|improve this question
How about the Hopf bundles? Those are the only bundles where the fibre, total space and base are all spheres -- a result, I believe, due to Frank Adams? Experts here will correct me if I'm wrong. – José Figueroa-O'Farrill Nov 3 '10 at 2:21
José's comment came at the same time as my answer. I believe him that they're the only examples. – Spiro Karigiannis Nov 3 '10 at 2:29
Here we're allowing the base to be arbitrary. – Romeo Nov 3 '10 at 2:46
The answer to (1b) is that the category does matter. Milnor found seven smooth 7-manifolds, all different in DIFF but all PL homeomorphic to $S^7$, which are $S^3$-bundles over $S^4$. [Jose: is your quotation of Adams precisely correct? Isn't there an infinite sequence of $S^3$-bundles over $S^4$ with Euler class $\pm 1$ but varying $p_1$, and a subsequence for which the total space is $S^7$ even in DIFF?] – Tim Perutz Nov 3 '10 at 4:28
Oops. I didn't read closely enough. Of course, if the base need not be a sphere either, there are the more general Hopf fibrations that Neil describes very well in his answer. – Spiro Karigiannis Nov 3 '10 at 12:28
show 1 more comment
4 Answers
More generally, there are bundles $S^0\to S^n\to \mathbb{R}P^n$ and $S^1\to S^{2n+1}\to\mathbb{C}P^n$ and $S^3\to S^{4n+3}\to\mathbb{H}P^n$. There is also an "octonionic projective plane" $\mathbb{O}P^2$ but you have to construct it in a nonobvious way as the quotient $F_4/Spin(9)$ of exceptional Lie groups; more obvious constructions do not work because $\mathbb{O}$ is not associative. This gives a bundle $S^7\to S^{23}\to\mathbb{O}P^2$. I think it is known that there is no bundle $S^7\to S^{8k+7}\to B$ for $k>2$ but I do not know a proof of that. In general, if we have $S^n\to S^m\to B$ with $n>0$ and $m>1$ then the homotopy long exact sequence of the fibration shows that $B$ is simply connected, so the Serre spectral sequence $H^{\ast}(B;H^\ast(S^n))\to H^\ast(S^m)$ has untwisted coefficients and we find that $H^\ast(B)=\mathbb{Z}[x]/x^k$ where $|x|=n+1$ and $m=(n+1)k-1$. Adams's Hopf Invariant One theorem (applied to the attaching map for the $2(n+1)$-cell in $B$) now implies that $n\in\{1,3,7\}$. If $n=1$ then the element $x$ gives a map $B\to K(\mathbb{Z},2)=\mathbb{C}P^\infty$ and we deduce that $B$ is homotopy equivalent to $\mathbb{C}P^{k-1}$. I don't immediately see how to deal with the cases $n=3$ or $n=7$ but I suspect that all examples are at least homotopy equivalent to examples that have been mentioned already. I don't know about homeomorphism or diffeomorphism.
share|improve this answer
One can construct $OP^2$ by attaching a 16-cell to $S^8$ via the Hopf bundle map $S^{15}\to S^8$, and this Hopf bundle can be constructed just using the octonions. (Details can be found in Example 4.47 of my algebraic topology book.) So Lie groups aren't needed to construct $OP^2$. If one had a bundle $S^7 \to S^{23} \to OP^2$, couldn't one attach a 24-cell to $OP^2$ via the map $S^{23} \to OP^2$ to construct an $OP^3$ (which doesn't exist)? – Allen Hatcher Nov 3 '10 at 9:21
There are exotic $\mathbb{HP}^n$s X such that X is 1-connected and has the same integral cohomology ring as $\mathbb{HP}^n$, but not the same homotopy type. There is also up to homotopy a fibration $S^3\to S^{4n-3}\to X$. This can be found in an article by McGibbon: jstor.org/stable/1998715?seq=3 I don't know if these X can be chosen as manifolds and the fibrations as actual bundles. Probably at least the first part should be accesible to the methods of surgery since we have here a simply connected Poincare duality space. – Lennart Meier Nov 3 '10 at 9:27
Allen is right. I remember reading somewhere (probably the article on Octonions by Baez, that although $\mathbb O \mathbb P^n$ exists for $n=1$ and $n=2$ only, the associated Hopf fibration $S^7 \to S^{8n+7} \to \mathbb O \mathbb P^n$ exists only for $n=1$. – Spiro Karigiannis Nov 3 '10 at 12:31
@Niel: very nice! – Romeo Nov 4 '10 at 0:43
add comment
This question was studied in a paper by Browder who proves the following.
Thereom. Consider any Serre fibration of $F\to S^n\to B$ where $F$, $B$ are connected polyhedra. Then $F$ is homotopy equivalent to $S^1$, $S^3$, or $S^7$. If $F=S^1$, then $B$ is homotopy equivalent to $CP^k$ with $2k+1=n$. If $F=S^7$, then $B$ is homotopy equivalent to $S^8$.
One expects that if $F= S^3$, then $B$ is homotopic to a quaternionic projective space of a suitable dimension but Browder mentions (if I am reading it correctly) that this is not true, and there are other examples.
Caution: there might be something wrong with the above theorem because it rules out existence of $S^7$ Hopf bundles over the octonian projective plane. Is there such a bundle? Hatcher's comment above says there isn't, am I reading it right? Could someone clarify the situation? I care because Browder's theorem was used in some geometric problems involving boundary at infinity of nonnegatively curved manifolds.
share|improve this answer
add comment
The Hopf fibrations give 4 such examples:
1) $S^3$ is an $S^1$ bundle over $\mathbb C \mathbb P^1 \cong S^2$, as you mentioned.
4) $S^0$ is an $S^1$ bundle over $\mathbb R \mathbb P^1 \cong S^1$.
I don't know if there are any others.
share|improve this answer
These are certainly the only examples where all three spaces are spheres. But certainly there are more: all complex projective spaces have circle bundles whose total spaces are spheres. – José Figueroa-O'Farrill Nov 3 '10 at 2:33
What's the map $S^9 \to CP^4$ giving a circle bundle? – Romeo Nov 3 '10 at 2:36
@Spiro: thanks for adding the other 2 classics! – Romeo Nov 3 '10 at 2:37
$CP^4 = (C^5-0)/C^*$, and since $C^5 \simeq R^10$, we can get an isomorphism $(C^5-0)/C^* \simeq S^9/U(1)$. So take $S^9 \subset C^5$ and then quotient by the natural diagonal action of the complex numbers of unit length. – David Roberts Nov 3 '10 at 2:54
that should be $R^{10}$ not $R^10$. $C^*$ is the nonzero complex numbers. – David Roberts Nov 3 '10 at 2:54
add comment
Here's a sketch. Take a look at the Gysin sequence. This will tell you that $H^i(B)$ and $H^{i+n+1}(B)$ are isomorphic except in two dimensions, which gives you (if $n$ is odd) a restriction on the possible cohomology rings for $B$: truncated polynomial algebras or (polynomial algebra tensor an exterior algebra). The latter cannot happen because such a space would be an infinite CW-complex and cannot be the base space of a fiber bundle with total space $S^m$ (something just homotopy equivalent to $S^m$ would be possible, though.) Hopf invariant 1 will then tell you that there's also a restriction on $n$. I'm guessing you'll end up with just the mentioned bundles over $RP^n$, $CP^n$, $HP^n$ and $OP^n$ (the latter for $n\leq 2$) and possibly some twisted versions of these.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/36660 | Would it be possible to have a more compact view of the question on the front page, as an option ? The gigantic vote number and views, could be made smaller. Focus only on the title and the author (tags are sort of redundant, as the page depends on your tag filtering, and the title normally says it all).
share|improve this question
A lot of users don't do tag filtering, so I don't think taking out the tags would be helpful, especially since people are encouraged to use the tags instead of putting keywords in titles. – Lance Roberts Oct 8 '09 at 22:15
add comment
1 Answer
up vote 1 down vote accepted
This is close to this issue, check it out.
share|improve this answer
Actually, it sounds like you want the Questions page to mimic the front page, but it sounds like Stefano wants the front page to be even more compact. – Kyle Cronin Jul 30 '09 at 17:03
hmm, good point, I'll edit my answer – Lance Roberts Jul 30 '09 at 17:11
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/36661 | In my answer to Should we require minimum reputation to continue asking questions? I came up with a possible solution.
The essential problem is that some people come to SO, ask lots of lame questions, and never give anything back. The proposals have included only allowing a certain fraction of one's rep to come from questions and only allowing users to ask questions if they have a certain amount of rep, but neither of those seemed particularly popular.
This suggestion is:
Require that unqualified users have their questions reviewed like edits before being posted.
What is the qualification? It could be rep that's a certain multiple of their questions (say 10 rep per question) or a certain ratio of questions to answers, or some other criteria. We could also allow a certain number of questions to not require review (say, 5-10) so that a user would have to lose their ability to ask unreviewed questions rather than have to earn it.
Who reviews these questions? It could be 5k, 10k, 20k users, or maybe anybody above 2k who also has the ability to post questions without review. It could even be people with sufficient points in the applicable tags.
How would this mitigate the flood of bad questions? First of all, users would be rate-limited by only being able to have a certain number (1?) of questions in review at once. If a user keeps getting their questions rejected, they could lose the ability to submit for a period of time ("We are no longer accepting questions from this IP"). When two reviewers reject a question, nobody else will ever see it (maybe not even as a deleted question). Of course, there would be an "Improve" button so that reviewers could fix minor problems before anybody else ever had to read the problematic post.
Furthermore, upon clicking the "Reject" button, there could be a dialog box with a list of checkboxes to select reasons for rejection ("Off topic", "Spammy links", "Lack of formatting", "Not a question", "Missing sample code", "Too much sample code", "Poor English", etc.) and maybe even a box for remarks. This would allow the person asking the question to see why their question was rejected, fix it and resubmit (if applicable). This should train users how to write acceptable questions. The review page could have the question's preview remarks and deltas from the last submission, a link to the user's most recent rejections, or something in between.
What are the downsides? Unfortunately, this would increase the burden on reviewers. Hopefully the "training" aspect should reduce the ongoing burden of any particular user and not having the bad questions posted in the first place should eliminate edit reviews (i.e. review the question before it's posted so you don't have to review several edits to the question after it's posted). In other words, this is like unit testing -- it seems like it would add too much of a burden initially, but it actually ends up saving time and helps deliver a higher-quality product in the end.
Some users could be insulted by having their question criticized. This should be minimized by having standard rejection reasons that aren't personal, while the remarks would hopefully be a polite nudge in the right direction (e.g. "Just specify the OS you're using"). Of course some users would go away entirely after being confronted by this, but it's not clear that those are users we want.
share|improve this question
I seriously doubt if the gains weight up to the burden of this formal approach. And with burden I refer to the downsides you mention yourself. – Rogier Apr 7 '11 at 19:37
@Rogier I don't see any other solution than investing even more personal effort to educate users. I don't know of any automated system that can teach someone how to behave or how to communicate. – Octavian Damiean Apr 7 '11 at 19:40
@Octavian Damiean I'm not saying that investing more personal effort is not a good idea per se. But does it have to be this formal? Furthermore, the fact that a rejection by (only) two reviewers could prevent a question from being visible at all feels a bit like 'government censorship'. – Rogier Apr 7 '11 at 19:58
@Rogier I agree that this idea could be refined a bit but it doesn't sound bad to me as a start. – Octavian Damiean Apr 7 '11 at 20:01
@Octavian Damiean All effort to increase SE/SO quality, like the above question, is to be respected. – Rogier Apr 7 '11 at 20:07
This is an awful, awful job. Wouldn't wish it on anybody. – Uphill Luge Apr 7 '11 at 20:28
@Hans: I agree. However, the downsides would be somewhat mitigated by the rule being that you can lose the ability to answer questions, rather than having to earn it. I can't see doing it any other way, in fact. As proposed, a user gets a number of questions "free" (though I'd say more like 25), and as long as those questions are mostly not closed and downvoted, and as long as the user has some modest rep gain, e never need be subject to the review process. The tricky bit, as always, is where to set the threshold. – Josh Caswell Apr 7 '11 at 20:50
@Rogier: To me this seems a bit like unit testing. This proposal would stop bad questions before they can become a problem, which in theory should reduce the overall amount of work and end up with a better final product. – Gabe Apr 8 '11 at 21:05
Sounds like it just makes more work for the people who are already burdened with answering (or editing, or closing) these poor quality questions. Not sure who this is really helping... – Cody Gray Apr 14 '11 at 7:59
@Cody: Let's say somebody posts a question with unformatted code. The idea is that rather than having to spend time editing a post, I could just click "Reject" (or "Fix your formatting" and "Reject") and let the OP fix it themselves. The OP learns how to format code (or never posts again), relieving the burden of everybody having to fix their crap, and everybody reading the site isn't burdened with their illegible post. – Gabe Apr 14 '11 at 8:09
add comment
1 Answer
I don't really see the point of this.
Why not "review" questions as they are asked?
The existing flagging and downvoting mechanisms should suffice without adding Yet Another Queue of Work for more of our users to have to deal with and think about.
Also, questions which fail to get any significant activity are already auto-culled over time, and downvoted questions with no significant activity auto-culled even more aggressively still.
share|improve this answer
I can't tell if your "why not" question is rhetorical or if you're actually asking it. – Gabe Apr 14 '11 at 7:57
I would want to believe he is actually asking because the review section works. Maybe it is hard to see it on SO due to the sheer volume, but I am sure if you ask mods on the rest of SE network ... it works. – phwd Apr 14 '11 at 8:16
@phwd: Ah, I see. After the link was added it makes sense. The difference is that the "review" page doesn't have a "reject" button, so the person posting the crappy question doesn't have any impetus to learn. – Gabe Apr 14 '11 at 8:43
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/36662 | @ChrisF first noted it here: "Just got a harmful web page warning from MSO - HTML-Script.inf - any ideas what's going on?"
And now users in the SF chat are also reporting this.
share|improve this question
The SF user who reported it is running Avast, and got the alarm immediately after doing a defs-DB update. – sysadmin1138 Apr 11 '11 at 19:49
Avast! Thar be vermin in yer web pages! Yarr! – Rob Hruska Apr 11 '11 at 21:44
add comment
1 Answer
up vote 5 down vote accepted
I don't think this is remotely valid. Probably an error in their anti-virus software.
share|improve this answer
Yes, there was apparently a new push from Avast shortly after that reversed that issue. We didn't think it was valid either. – jcolebrand Apr 11 '11 at 20:03
At this point I think it's pretty well confirmed that someone at Avast fat-fingered an update. I mostly just wanted this to be posted on account of "oh noes! is anyone else having this problem!" for other users. I believe it could even be deleted in a week or three (it's a very temporal problem, but updates may not be countered for some time) – jcolebrand Apr 11 '11 at 22:09
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/36669 | Ongoing Coverage:
Politics & Government
8:00 am
Tue January 22, 2013
Commentary: Rigging presidential elections
Lessenberry commentary for 1/22/13
Here’s what they want to do: Currently, the Electoral College works like this. The presidential candidate who wins a state gets all that state’s electoral votes. This is true in every state except Maine and Nebraska, and has almost always been true there too.
Every state has a number of electoral votes equivalent to the number of congressmen and senators it has. After everyone has voted, they add the numbers up and the winner wins.
Usually, the margin is very decisive. Last fall, for example, the vote was 332 for President Obama and 206 for Mitt Romney. The Obama totals include all 16 of Michigan’s votes.
But what if instead of having a winner-take-all system, Michigan split its electoral vote by congressional district, with the overall statewide winner getting the two bonus votes? That would have meant Romney would have won Michigan, nine votes to seven, even though Obama won the state’s popular vote easily, by almost half a million votes.
If this system had been put in place nationwide, Mr. Romney would have won the election last fall, despite losing the nationwide popular count by almost five million votes. That’s because Romney won more congressional districts, thanks to gerrymandering and legislative redistricting.
That’s why the GOP has a solid majority in the U.S. House, even though more than a million more votes were cast for Democrats nationwide. Roughly, they created a lot of districts where Republicans get around 55 percent of the votes, and a smaller number where as many as 80 percent of the voters are Democrats. Since 1888, the current Electoral College system has given us a president who won the popular vote every time, except once.
Switching to a congressional district system would mean the candidate people didn’t want would usually become president. That could completely undermine confidence in our political system. Plus, it would make Michigan more irrelevant nationally. President George W. Bush campaigned a lot in Michigan because he thought he had a chance to carry the state.
Neither side would pay us much attention if the most any campaign could sway would be one or two electoral votes.
Making a change like this would be the final triumph of cynicism over democracy. This bad idea should be abandoned, right away.
|
global_01_local_0_shard_00000017_processed.jsonl/36681 | How to Build Your Retirement Money Plan
Don’t overlook the need to figure out how to convert nest-egg funds into streams of retirement income.
Turning your retirement savings into a flow of predictable income payments is, of course, essential to a successful retirement. It's also often one of the hardest and most overlooked tasks leading up to actually retiring.
Female hands and calculator
Female hands and calculator
Some experts may give different names to the steps of this task, but they boil down to three: your preparation, your buckets and your investments.
Your Preparation
Review 10 or even 20 retirement books and the same preparation steps appear over and over again. Here are the ones common to most approaches:
1. Add up the value of your savings and investment accounts.
2. Calculate how much additional money you can afford to set aside each year.
3. Play with different possible rates of future investment gains and see what your nest egg will look like when you'd like to retire.
4. How long do you think you'll live? Most experts recommend erring on the side of longevity, but your family health history may argue otherwise. For starters, figure you'll be able to pull 4 percent out of your portfolio every year and not risk outliving that income. However, this 4 percent "rule" is increasingly being challenged as too inflexible in today's volatile market environment. Use it as a guide.
5. Factor in Social Security and any pensions you are set to receive.
6. Total your annual retirement income (don't forget to consider taxes).
7. Build a realistic retirement expense budget; consider setting aside a cushion for emergencies.
8. Compare your income and expenses. Perhaps you'll need to tack on some more working years before they balance out. Most likely, you'll need to cut expenses as well.
Your Buckets
Retirement income needs to be broken down into components that achieve different objectives. Some people call these pieces of retirement income buckets; others may call them tiers or layers.
Most experts say you should have a cash spending account that begins with enough money to pay all your expenses for at least several months, and even longer if you can afford it. This will reduce the pressure to sell securities when market conditions are bad. It's also the account into which your retirement income payments will flow, often automatically due to electronic deposit arrangements.
Next, you should think about aligning your guaranteed income with your essential expenses—the things you have to pay. Guaranteed income includes Social Security and pensions. If this income does not cover your basic expenses, many advisers suggest using some of your nest egg to buy the missing piece of guaranteed income.
The most common way is by buying an annuity, but you could also consider buying U.S. securities and using their interest payments to cover the basic expense gap. At the same time, many other advisers prefer to close this basic spending gap with investment earnings from your nest egg. Odds are, you'll earn more money than with an annuity. And while your investment earnings are not guaranteed, you will not have to largely give up control of your funds, which is the case with an annuity.
[Read: Why Mutual Funds Are Getting Cheaper to Own.]
I understand but disagree with this view because it exposes you in declining markets to either selling investments at a loss or reducing your standard of living by cutting basic living expenses. Do everything you can to cover fixed expenses with guaranteed income.
Discretionary spending would then be provided from your investment funds. The thinking is that you could curb such spending if market downturns reduced your investment income. You could even split your discretionary spending into smaller buckets, reserving your highest-risk, highest-return holdings for luxury and whimsical spending plans that wouldn't crush you if your investments fizzled out.
Lastly, you may have a legacy bucket and want to leave money to your heirs.
Your Investments
Once you've defined your income buckets, there is still a lot of heavy lifting to actually produce those regular income payments. Where are all your investments parked? Which ones are taxable and which ones aren't? How do you maximize tax benefits when withdrawing funds? What about those federal rules requiring minimum distributions from IRAs at a certain age? How do they work?
There is lots of good news here for self-directed investors who can't afford or don't want their own financial adviser. It's hardly a secret that millions of baby boomers are entering their retirement years. Trillions of dollars of employee retirement accounts will need to be converted in the coming years into sources of long-term income payments. Investment firms, particularly the big mutual fund companies that manage 401(k)s for millions of employees, want access to this stream of conversions and lucrative long-term investment fees.
[See 7 Mutual Funds That Make Huge Bets]
They have invested heavily to build online retirement planning, investing and retirement spending tools. Many tools are sophisticated enough to reflect tax strategies, different investor risk preferences, and nuances of individual retirement needs. At the same time, investment companies are creating new breeds of retiree investment funds that offer systematic withdrawal plans and other "set it and forget it" funds that generate monthly payouts from investment accounts.
Find the sites that work best for you to help execute the three basic components of your retirement plan. And don't forget to also prepare the needed legal documents that will protect you and your family members if you have an unexpected health emergency: power of attorney, healthcare proxy and living will, and, of course, a final will. Talk about your needs with a legal adviser and key family members. These are essential matters that are best discussed when you're healthy, not after you become ill. |
global_01_local_0_shard_00000017_processed.jsonl/36684 | Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic
HealthVaultPlatformRecord Class
Provides low-level access to the HealthVault record operations.
Namespace: Microsoft.Health.PlatformPrimitives
Assembly: Microsoft.Health (in Microsoft.Health.dll) Version: (1.15.1003.9505)
public ref class HealthVaultPlatformRecord
HealthVaultPlatform uses this class to perform operations. Set HealthVaultPlatformRecord.Current to a derived class to intercept all message calls.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft. All rights reserved. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.